2021-01-27 09:06:18 -05:00
{
"WebCryptoAPI" : {
2021-06-04 14:46:44 -04:00
"getRandomValues.any.html" : true ,
2021-10-08 11:44:38 -04:00
"getRandomValues.any.worker.html" : true ,
2021-06-04 14:46:44 -04:00
"derive_bits_keys" : {
"ecdh_bits.https.any.html" : false ,
2021-10-08 11:44:38 -04:00
"ecdh_bits.https.any.worker.html" : false ,
2021-06-04 14:46:44 -04:00
"ecdh_keys.https.any.html" : false ,
2021-10-08 11:44:38 -04:00
"ecdh_keys.https.any.worker.html" : false ,
2021-08-03 15:24:02 -04:00
"hkdf.https.any.html?1-1000" : [
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage"
] ,
"hkdf.https.any.html?1001-2000" : [
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key"
2021-08-03 15:24:02 -04:00
] ,
"hkdf.https.any.html?2001-3000" : [
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage"
] ,
"hkdf.https.any.html?3001-last" : [
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"hkdf.https.any.worker.html?1-1000" : [
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage"
] ,
"hkdf.https.any.worker.html?1001-2000" : [
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key"
2021-10-08 11:44:38 -04:00
] ,
"hkdf.https.any.worker.html?2001-3000" : [
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage"
] ,
"hkdf.https.any.worker.html?3001-last" : [
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info" ,
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key"
2021-10-08 11:44:38 -04:00
] ,
2021-08-03 15:24:02 -04:00
"pbkdf2.https.any.html?1-1000" : [
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"pbkdf2.https.any.html?1001-2000" : [
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key"
2021-10-08 11:44:38 -04:00
] ,
"pbkdf2.https.any.html?2001-3000" : [
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage"
] ,
"pbkdf2.https.any.html?3001-4000" : [
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key"
2021-10-08 11:44:38 -04:00
] ,
"pbkdf2.https.any.html?4001-5000" : [
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key"
2021-10-08 11:44:38 -04:00
] ,
"pbkdf2.https.any.html?5001-6000" : [
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key"
2021-10-08 11:44:38 -04:00
] ,
"pbkdf2.https.any.html?6001-7000" : [
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key"
2021-10-08 11:44:38 -04:00
] ,
"pbkdf2.https.any.html?7001-8000" : [
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 0 iterations" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 0 iterations"
2021-10-08 11:44:38 -04:00
] ,
"pbkdf2.https.any.html?8001-last" : [
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 0 iterations" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 0 iterations"
2021-10-08 11:44:38 -04:00
] ,
"pbkdf2.https.any.worker.html?1-1000" : [
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key"
2021-10-08 11:44:38 -04:00
] ,
"pbkdf2.https.any.worker.html?1001-2000" : [
2021-08-03 15:24:02 -04:00
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"pbkdf2.https.any.worker.html?2001-3000" : [
2021-08-03 15:24:02 -04:00
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage"
] ,
2021-10-08 11:44:38 -04:00
"pbkdf2.https.any.worker.html?3001-4000" : [
2021-08-03 15:24:02 -04:00
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"pbkdf2.https.any.worker.html?4001-5000" : [
2021-08-03 15:24:02 -04:00
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"pbkdf2.https.any.worker.html?5001-6000" : [
2021-08-03 15:24:02 -04:00
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"pbkdf2.https.any.worker.html?6001-7000" : [
2021-08-03 15:24:02 -04:00
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"pbkdf2.https.any.worker.html?7001-8000" : [
2021-08-03 15:24:02 -04:00
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 0 iterations" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 0 iterations"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"pbkdf2.https.any.worker.html?8001-last" : [
2021-08-03 15:24:02 -04:00
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage" ,
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key" ,
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 0 iterations" ,
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 0 iterations" ,
2021-10-12 09:48:08 -04:00
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 0 iterations"
2021-08-03 15:24:02 -04:00
]
2021-06-04 14:46:44 -04:00
} ,
"digest" : {
2021-10-08 11:44:38 -04:00
"digest.https.any.html" : true ,
"digest.https.any.worker.html" : true
2021-06-04 14:46:44 -04:00
} ,
"encrypt_decrypt" : {
2021-10-12 09:48:08 -04:00
"aes_cbc.https.any.html" : false ,
"aes_cbc.https.any.worker.html" : false ,
2021-08-03 15:24:02 -04:00
"aes_ctr.https.any.html" : [
2021-10-12 09:48:08 -04:00
"AES-CTR 128-bit key" ,
"AES-CTR 192-bit key" ,
"AES-CTR 256-bit key" ,
"AES-CTR 128-bit key with altered plaintext" ,
"AES-CTR 192-bit key with altered plaintext" ,
"AES-CTR 256-bit key with altered plaintext" ,
"AES-CTR 128-bit key decryption" ,
"AES-CTR 192-bit key decryption" ,
"AES-CTR 256-bit key decryption" ,
"AES-CTR 128-bit key decryption with altered ciphertext" ,
"AES-CTR 192-bit key decryption with altered ciphertext" ,
"AES-CTR 256-bit key decryption with altered ciphertext" ,
"AES-CTR 128-bit key without encrypt usage" ,
"AES-CTR 192-bit key without encrypt usage" ,
"AES-CTR 256-bit key without encrypt usage" ,
"AES-CTR 128-bit key with mismatched key and algorithm" ,
"AES-CTR 192-bit key with mismatched key and algorithm" ,
"AES-CTR 256-bit key with mismatched key and algorithm" ,
"AES-CTR 128-bit key without decrypt usage" ,
"AES-CTR 192-bit key without decrypt usage" ,
"AES-CTR 256-bit key without decrypt usage" ,
"AES-CTR 128-bit key, 0-bit counter" ,
"AES-CTR 128-bit key, 129-bit counter" ,
"AES-CTR 192-bit key, 0-bit counter" ,
"AES-CTR 192-bit key, 129-bit counter" ,
"AES-CTR 256-bit key, 0-bit counter" ,
"AES-CTR 256-bit key, 129-bit counter" ,
"AES-CTR 128-bit key, 0-bit counter decryption" ,
"AES-CTR 128-bit key, 129-bit counter decryption" ,
"AES-CTR 192-bit key, 0-bit counter decryption" ,
"AES-CTR 192-bit key, 129-bit counter decryption" ,
"AES-CTR 256-bit key, 0-bit counter decryption" ,
"AES-CTR 256-bit key, 129-bit counter decryption"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"aes_ctr.https.any.worker.html" : [
2021-10-12 09:48:08 -04:00
"AES-CTR 128-bit key" ,
"AES-CTR 192-bit key" ,
"AES-CTR 256-bit key" ,
"AES-CTR 128-bit key with altered plaintext" ,
"AES-CTR 192-bit key with altered plaintext" ,
"AES-CTR 256-bit key with altered plaintext" ,
"AES-CTR 128-bit key decryption" ,
"AES-CTR 192-bit key decryption" ,
"AES-CTR 256-bit key decryption" ,
"AES-CTR 128-bit key decryption with altered ciphertext" ,
"AES-CTR 192-bit key decryption with altered ciphertext" ,
"AES-CTR 256-bit key decryption with altered ciphertext" ,
"AES-CTR 128-bit key without encrypt usage" ,
"AES-CTR 192-bit key without encrypt usage" ,
"AES-CTR 256-bit key without encrypt usage" ,
"AES-CTR 128-bit key with mismatched key and algorithm" ,
"AES-CTR 192-bit key with mismatched key and algorithm" ,
"AES-CTR 256-bit key with mismatched key and algorithm" ,
"AES-CTR 128-bit key without decrypt usage" ,
"AES-CTR 192-bit key without decrypt usage" ,
"AES-CTR 256-bit key without decrypt usage" ,
"AES-CTR 128-bit key, 0-bit counter" ,
"AES-CTR 128-bit key, 129-bit counter" ,
"AES-CTR 192-bit key, 0-bit counter" ,
"AES-CTR 192-bit key, 129-bit counter" ,
"AES-CTR 256-bit key, 0-bit counter" ,
"AES-CTR 256-bit key, 129-bit counter" ,
"AES-CTR 128-bit key, 0-bit counter decryption" ,
"AES-CTR 128-bit key, 129-bit counter decryption" ,
"AES-CTR 192-bit key, 0-bit counter decryption" ,
"AES-CTR 192-bit key, 129-bit counter decryption" ,
"AES-CTR 256-bit key, 0-bit counter decryption" ,
"AES-CTR 256-bit key, 129-bit counter decryption"
2021-10-08 11:44:38 -04:00
] ,
"aes_gcm.https.any.html" : [
2021-10-12 09:48:08 -04:00
"AES-GCM 128-bit key, 32-bit tag" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag" ,
"AES-GCM 128-bit key, 64-bit tag" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag" ,
"AES-GCM 128-bit key, 96-bit tag" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag" ,
"AES-GCM 128-bit key, 104-bit tag" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag" ,
"AES-GCM 128-bit key, 112-bit tag" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag" ,
"AES-GCM 128-bit key, 120-bit tag" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag" ,
"AES-GCM 128-bit key, 128-bit tag" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag" ,
"AES-GCM 192-bit key, 32-bit tag" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag" ,
"AES-GCM 192-bit key, 64-bit tag" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag" ,
"AES-GCM 192-bit key, 96-bit tag" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag" ,
"AES-GCM 192-bit key, 104-bit tag" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag" ,
"AES-GCM 192-bit key, 112-bit tag" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag" ,
"AES-GCM 192-bit key, 120-bit tag" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag" ,
"AES-GCM 192-bit key, 128-bit tag" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag" ,
"AES-GCM 256-bit key, 32-bit tag" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag" ,
"AES-GCM 256-bit key, 64-bit tag" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag" ,
"AES-GCM 256-bit key, 96-bit tag" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag" ,
"AES-GCM 256-bit key, 104-bit tag" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag" ,
"AES-GCM 256-bit key, 112-bit tag" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag" ,
"AES-GCM 256-bit key, 120-bit tag" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag" ,
"AES-GCM 256-bit key, 128-bit tag" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag" ,
"AES-GCM 128-bit key, 32-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 64-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 96-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 104-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 112-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 120-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 128-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 32-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 64-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 96-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 104-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 112-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 120-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 128-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 32-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 64-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 96-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 104-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 112-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 120-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 128-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 32-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag decryption" ,
"AES-GCM 128-bit key, 64-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag decryption" ,
"AES-GCM 128-bit key, 96-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag decryption" ,
"AES-GCM 128-bit key, 104-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag decryption" ,
"AES-GCM 128-bit key, 112-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag decryption" ,
"AES-GCM 128-bit key, 120-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag decryption" ,
"AES-GCM 128-bit key, 128-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag decryption" ,
"AES-GCM 192-bit key, 32-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag decryption" ,
"AES-GCM 192-bit key, 64-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag decryption" ,
"AES-GCM 192-bit key, 96-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag decryption" ,
"AES-GCM 192-bit key, 104-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag decryption" ,
"AES-GCM 192-bit key, 112-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag decryption" ,
"AES-GCM 192-bit key, 120-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag decryption" ,
"AES-GCM 192-bit key, 128-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag decryption" ,
"AES-GCM 256-bit key, 32-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag decryption" ,
"AES-GCM 256-bit key, 64-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag decryption" ,
"AES-GCM 256-bit key, 96-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag decryption" ,
"AES-GCM 256-bit key, 104-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag decryption" ,
"AES-GCM 256-bit key, 112-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag decryption" ,
"AES-GCM 256-bit key, 120-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag decryption" ,
"AES-GCM 256-bit key, 128-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag decryption" ,
"AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 32-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 64-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 96-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 104-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 112-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 120-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 128-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 32-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 64-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 96-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 104-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 112-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 120-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 128-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 32-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 64-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 96-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 104-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 112-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 120-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 128-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 32-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 64-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 96-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 104-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 112-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 120-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 128-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 32-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 64-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 96-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 104-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 112-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 120-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 128-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 32-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 64-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 96-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 104-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 112-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 120-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 128-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, illegal tag length 24-bits" ,
"AES-GCM 128-bit key, illegal tag length 48-bits" ,
"AES-GCM 128-bit key, illegal tag length 72-bits" ,
"AES-GCM 128-bit key, illegal tag length 95-bits" ,
"AES-GCM 128-bit key, illegal tag length 129-bits" ,
"AES-GCM 128-bit key, illegal tag length 256-bits" ,
"AES-GCM 192-bit key, illegal tag length 24-bits" ,
"AES-GCM 192-bit key, illegal tag length 48-bits" ,
"AES-GCM 192-bit key, illegal tag length 72-bits" ,
"AES-GCM 192-bit key, illegal tag length 95-bits" ,
"AES-GCM 192-bit key, illegal tag length 129-bits" ,
"AES-GCM 192-bit key, illegal tag length 256-bits" ,
"AES-GCM 256-bit key, illegal tag length 24-bits" ,
"AES-GCM 256-bit key, illegal tag length 48-bits" ,
"AES-GCM 256-bit key, illegal tag length 72-bits" ,
"AES-GCM 256-bit key, illegal tag length 95-bits" ,
"AES-GCM 256-bit key, illegal tag length 129-bits" ,
"AES-GCM 256-bit key, illegal tag length 256-bits" ,
"AES-GCM 128-bit key, illegal tag length 24-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 48-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 72-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 95-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 129-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 256-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 24-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 48-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 72-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 95-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 129-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 256-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 24-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 48-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 72-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 95-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 129-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 256-bits decryption"
2021-10-08 11:44:38 -04:00
] ,
"aes_gcm.https.any.worker.html" : [
2021-10-12 09:48:08 -04:00
"AES-GCM 128-bit key, 32-bit tag" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag" ,
"AES-GCM 128-bit key, 64-bit tag" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag" ,
"AES-GCM 128-bit key, 96-bit tag" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag" ,
"AES-GCM 128-bit key, 104-bit tag" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag" ,
"AES-GCM 128-bit key, 112-bit tag" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag" ,
"AES-GCM 128-bit key, 120-bit tag" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag" ,
"AES-GCM 128-bit key, 128-bit tag" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag" ,
"AES-GCM 192-bit key, 32-bit tag" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag" ,
"AES-GCM 192-bit key, 64-bit tag" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag" ,
"AES-GCM 192-bit key, 96-bit tag" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag" ,
"AES-GCM 192-bit key, 104-bit tag" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag" ,
"AES-GCM 192-bit key, 112-bit tag" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag" ,
"AES-GCM 192-bit key, 120-bit tag" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag" ,
"AES-GCM 192-bit key, 128-bit tag" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag" ,
"AES-GCM 256-bit key, 32-bit tag" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag" ,
"AES-GCM 256-bit key, 64-bit tag" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag" ,
"AES-GCM 256-bit key, 96-bit tag" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag" ,
"AES-GCM 256-bit key, 104-bit tag" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag" ,
"AES-GCM 256-bit key, 112-bit tag" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag" ,
"AES-GCM 256-bit key, 120-bit tag" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag" ,
"AES-GCM 256-bit key, 128-bit tag" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag" ,
"AES-GCM 128-bit key, 32-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 64-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 96-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 104-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 112-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 120-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 128-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 32-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 64-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 96-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 104-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 112-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 120-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, 128-bit tag with altered plaintext" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 32-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 64-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 96-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 104-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 112-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 120-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, 128-bit tag with altered plaintext" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext" ,
"AES-GCM 128-bit key, 32-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag decryption" ,
"AES-GCM 128-bit key, 64-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag decryption" ,
"AES-GCM 128-bit key, 96-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag decryption" ,
"AES-GCM 128-bit key, 104-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag decryption" ,
"AES-GCM 128-bit key, 112-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag decryption" ,
"AES-GCM 128-bit key, 120-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag decryption" ,
"AES-GCM 128-bit key, 128-bit tag decryption" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag decryption" ,
"AES-GCM 192-bit key, 32-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag decryption" ,
"AES-GCM 192-bit key, 64-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag decryption" ,
"AES-GCM 192-bit key, 96-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag decryption" ,
"AES-GCM 192-bit key, 104-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag decryption" ,
"AES-GCM 192-bit key, 112-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag decryption" ,
"AES-GCM 192-bit key, 120-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag decryption" ,
"AES-GCM 192-bit key, 128-bit tag decryption" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag decryption" ,
"AES-GCM 256-bit key, 32-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag decryption" ,
"AES-GCM 256-bit key, 64-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag decryption" ,
"AES-GCM 256-bit key, 96-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag decryption" ,
"AES-GCM 256-bit key, 104-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag decryption" ,
"AES-GCM 256-bit key, 112-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag decryption" ,
"AES-GCM 256-bit key, 120-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag decryption" ,
"AES-GCM 256-bit key, 128-bit tag decryption" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag decryption" ,
"AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext" ,
"AES-GCM 128-bit key, 32-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 64-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 96-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 104-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 112-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 120-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 128-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 32-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 64-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 96-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 104-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 112-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 120-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, 128-bit tag without encrypt usage" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 32-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 64-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 96-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 104-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 112-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 120-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, 128-bit tag without encrypt usage" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage" ,
"AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm" ,
"AES-GCM 128-bit key, 32-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 64-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 96-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 104-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 112-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 120-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, 128-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 32-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 64-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 96-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 104-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 112-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 120-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, 128-bit tag without decrypt usage" ,
"AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 32-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 64-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 96-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 104-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 112-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 120-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, 128-bit tag without decrypt usage" ,
"AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage" ,
"AES-GCM 128-bit key, illegal tag length 24-bits" ,
"AES-GCM 128-bit key, illegal tag length 48-bits" ,
"AES-GCM 128-bit key, illegal tag length 72-bits" ,
"AES-GCM 128-bit key, illegal tag length 95-bits" ,
"AES-GCM 128-bit key, illegal tag length 129-bits" ,
"AES-GCM 128-bit key, illegal tag length 256-bits" ,
"AES-GCM 192-bit key, illegal tag length 24-bits" ,
"AES-GCM 192-bit key, illegal tag length 48-bits" ,
"AES-GCM 192-bit key, illegal tag length 72-bits" ,
"AES-GCM 192-bit key, illegal tag length 95-bits" ,
"AES-GCM 192-bit key, illegal tag length 129-bits" ,
"AES-GCM 192-bit key, illegal tag length 256-bits" ,
"AES-GCM 256-bit key, illegal tag length 24-bits" ,
"AES-GCM 256-bit key, illegal tag length 48-bits" ,
"AES-GCM 256-bit key, illegal tag length 72-bits" ,
"AES-GCM 256-bit key, illegal tag length 95-bits" ,
"AES-GCM 256-bit key, illegal tag length 129-bits" ,
"AES-GCM 256-bit key, illegal tag length 256-bits" ,
"AES-GCM 128-bit key, illegal tag length 24-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 48-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 72-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 95-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 129-bits decryption" ,
"AES-GCM 128-bit key, illegal tag length 256-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 24-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 48-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 72-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 95-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 129-bits decryption" ,
"AES-GCM 192-bit key, illegal tag length 256-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 24-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 48-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 72-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 95-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 129-bits decryption" ,
"AES-GCM 256-bit key, illegal tag length 256-bits decryption"
2021-08-03 15:24:02 -04:00
] ,
"rsa_oaep.https.any.html" : [
"importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label no encrypt usage"
2021-10-08 11:44:38 -04:00
] ,
"rsa_oaep.https.any.worker.html" : [
"importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption with altered ciphertext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label using publicKey to decrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label no decrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label with altered plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label too long plaintext" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label using privateKey to encrypt" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and no label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and no label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and no label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and no label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-1 and a label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-256 and a label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-384 and a label no encrypt usage" ,
"importVectorKeys step: RSA-OAEP with SHA-512 and a label no encrypt usage"
2021-08-03 15:24:02 -04:00
]
2021-06-04 14:46:44 -04:00
} ,
"generateKey" : {
2021-08-31 05:25:44 -04:00
"failures_AES-CBC.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"failures_AES-CBC.https.any.worker.html" : true ,
2021-08-31 05:25:44 -04:00
"failures_AES-CTR.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"failures_AES-CTR.https.any.worker.html" : true ,
2021-08-31 05:25:44 -04:00
"failures_AES-GCM.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"failures_AES-GCM.https.any.worker.html" : true ,
2021-08-31 05:25:44 -04:00
"failures_AES-KW.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"failures_AES-KW.https.any.worker.html" : true ,
2021-07-06 08:16:04 -04:00
"failures_ECDH.https.any.html" : [
"Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [])" ,
"Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [])"
] ,
2021-10-08 11:44:38 -04:00
"failures_ECDH.https.any.worker.html" : [
"Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [])" ,
"Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [])"
] ,
2021-07-06 08:16:04 -04:00
"failures_ECDSA.https.any.html" : [
"Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [])" ,
"Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [])"
] ,
2021-10-08 11:44:38 -04:00
"failures_ECDSA.https.any.worker.html" : [
"Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [])" ,
"Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [])"
] ,
2021-08-16 12:11:36 -04:00
"failures_HMAC.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"failures_HMAC.https.any.worker.html" : true ,
2021-08-24 15:59:02 -04:00
"failures_RSA-OAEP.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"failures_RSA-OAEP.https.any.worker.html" : true ,
2021-08-16 12:11:36 -04:00
"failures_RSA-PSS.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"failures_RSA-PSS.https.any.worker.html" : true ,
2021-08-16 12:11:36 -04:00
"failures_RSASSA-PKCS1-v1_5.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"failures_RSASSA-PKCS1-v1_5.https.any.worker.html" : true ,
2021-08-31 05:25:44 -04:00
"successes_AES-CBC.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"successes_AES-CBC.https.any.worker.html" : true ,
2021-08-31 05:25:44 -04:00
"successes_AES-CTR.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"successes_AES-CTR.https.any.worker.html" : true ,
2021-08-31 05:25:44 -04:00
"successes_AES-GCM.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"successes_AES-GCM.https.any.worker.html" : true ,
2021-08-31 05:25:44 -04:00
"successes_AES-KW.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"successes_AES-KW.https.any.worker.html" : true ,
2021-08-16 12:11:36 -04:00
"successes_HMAC.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"successes_HMAC.https.any.worker.html" : true ,
2021-09-13 05:35:49 -04:00
"successes_ECDH.https.any.html" : [
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])"
] ,
2021-10-08 11:44:38 -04:00
"successes_ECDH.https.any.worker.html" : [
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])" ,
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])"
] ,
2021-07-06 08:16:04 -04:00
"successes_ECDSA.https.any.html" : [
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])"
] ,
2021-10-08 11:44:38 -04:00
"successes_ECDSA.https.any.worker.html" : [
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])" ,
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])"
] ,
"successes_RSA-OAEP.https.any.html?1-10" : true ,
"successes_RSA-OAEP.https.any.html?101-110" : true ,
"successes_RSA-OAEP.https.any.html?11-20" : true ,
"successes_RSA-OAEP.https.any.html?111-120" : true ,
"successes_RSA-OAEP.https.any.html?121-130" : true ,
"successes_RSA-OAEP.https.any.html?131-140" : true ,
"successes_RSA-OAEP.https.any.html?141-150" : true ,
"successes_RSA-OAEP.https.any.html?151-last" : true ,
"successes_RSA-OAEP.https.any.html?21-30" : true ,
"successes_RSA-OAEP.https.any.html?31-40" : true ,
"successes_RSA-OAEP.https.any.html?41-50" : true ,
"successes_RSA-OAEP.https.any.html?51-60" : true ,
"successes_RSA-OAEP.https.any.html?61-70" : true ,
"successes_RSA-OAEP.https.any.html?71-80" : true ,
"successes_RSA-OAEP.https.any.html?81-90" : true ,
"successes_RSA-OAEP.https.any.html?91-100" : true ,
"successes_RSA-OAEP.https.any.worker.html?1-10" : true ,
"successes_RSA-OAEP.https.any.worker.html?101-110" : true ,
"successes_RSA-OAEP.https.any.worker.html?11-20" : true ,
"successes_RSA-OAEP.https.any.worker.html?111-120" : true ,
"successes_RSA-OAEP.https.any.worker.html?121-130" : true ,
"successes_RSA-OAEP.https.any.worker.html?131-140" : true ,
"successes_RSA-OAEP.https.any.worker.html?141-150" : true ,
"successes_RSA-OAEP.https.any.worker.html?151-last" : true ,
"successes_RSA-OAEP.https.any.worker.html?21-30" : true ,
"successes_RSA-OAEP.https.any.worker.html?31-40" : true ,
"successes_RSA-OAEP.https.any.worker.html?41-50" : true ,
"successes_RSA-OAEP.https.any.worker.html?51-60" : true ,
"successes_RSA-OAEP.https.any.worker.html?61-70" : true ,
"successes_RSA-OAEP.https.any.worker.html?71-80" : true ,
"successes_RSA-OAEP.https.any.worker.html?81-90" : true ,
"successes_RSA-OAEP.https.any.worker.html?91-100" : true ,
"successes_RSA-PSS.https.any.html?1-10" : true ,
"successes_RSA-PSS.https.any.html?11-20" : true ,
"successes_RSA-PSS.https.any.html?21-30" : true ,
"successes_RSA-PSS.https.any.html?31-last" : true ,
"successes_RSA-PSS.https.any.worker.html?1-10" : true ,
"successes_RSA-PSS.https.any.worker.html?11-20" : true ,
"successes_RSA-PSS.https.any.worker.html?21-30" : true ,
"successes_RSA-PSS.https.any.worker.html?31-last" : true ,
"successes_RSASSA-PKCS1-v1_5.https.any.html?1-10" : true ,
"successes_RSASSA-PKCS1-v1_5.https.any.html?11-20" : true ,
"successes_RSASSA-PKCS1-v1_5.https.any.html?21-30" : true ,
"successes_RSASSA-PKCS1-v1_5.https.any.html?31-last" : true ,
"successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10" : true ,
"successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20" : true ,
"successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30" : true ,
"successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last" : true
} ,
"historical.any.html" : false ,
"historical.any.worker.html" : false ,
"idlharness.https.any.html" : [
"SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)" ,
"SubtleCrypto interface: crypto.subtle must inherit property \"unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)\" with the proper type" ,
"SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError" ,
"Window interface: attribute crypto"
] ,
"idlharness.https.any.worker.html" : [
"SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)" ,
"SubtleCrypto interface: crypto.subtle must inherit property \"unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)\" with the proper type" ,
"SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError" ,
"WorkerGlobalScope interface: attribute crypto"
] ,
"import_export" : {
"ec_importKey.https.any.html" : false ,
"ec_importKey.https.any.worker.html" : false ,
"rsa_importKey.https.any.html" : [
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])"
] ,
"rsa_importKey.https.any.worker.html" : [
2021-09-14 09:21:20 -04:00
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])" ,
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])" ,
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])"
] ,
2021-10-08 11:44:38 -04:00
"symmetric_importKey.https.any.html" : [
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey])"
] ,
"symmetric_importKey.https.any.worker.html" : [
2021-08-16 12:11:36 -04:00
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt])" ,
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt])" ,
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey])" ,
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey])" ,
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])" ,
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey])" ,
2021-09-11 16:54:03 -04:00
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey])"
2021-08-16 12:11:36 -04:00
]
2021-06-04 14:46:44 -04:00
} ,
2021-06-05 08:46:24 -04:00
"randomUUID.https.any.html" : true ,
2021-10-08 11:44:38 -04:00
"randomUUID.https.any.worker.html" : true ,
2021-06-04 14:46:44 -04:00
"sign_verify" : {
2021-08-03 15:24:02 -04:00
"ecdsa.https.any.html" : [
"importVectorKeys step: ECDSA P-256 with SHA-1 verification" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 round trip" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 round trip" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 round trip" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 round trip" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 round trip" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 round trip" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 round trip" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 round trip" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 round trip" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 round trip" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 round trip" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 round trip" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext" ,
2021-08-16 12:11:36 -04:00
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name"
2021-08-03 15:24:02 -04:00
] ,
2021-10-08 11:44:38 -04:00
"ecdsa.https.any.worker.html" : [
"importVectorKeys step: ECDSA P-256 with SHA-1 verification" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 round trip" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 round trip" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 round trip" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 round trip" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 round trip" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 round trip" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 round trip" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 round trip" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 round trip" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 round trip" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 round trip" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 round trip" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name" ,
"importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name"
] ,
"hmac.https.any.html" : [
"generate wrong key step: HMAC with SHA-1 signing with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-256 signing with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-384 signing with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-512 signing with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-1 verifying with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-256 verifying with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-384 verifying with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-512 verifying with wrong algorithm name" ,
"importVectorKeys step: HMAC with SHA-1 verification" ,
"importVectorKeys step: HMAC with SHA-256 verification" ,
"importVectorKeys step: HMAC with SHA-384 verification" ,
"importVectorKeys step: HMAC with SHA-512 verification" ,
"importVectorKeys step: HMAC with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: HMAC with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: HMAC with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: HMAC with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: HMAC with SHA-1 with altered plaintext" ,
"importVectorKeys step: HMAC with SHA-256 with altered plaintext" ,
"importVectorKeys step: HMAC with SHA-384 with altered plaintext" ,
"importVectorKeys step: HMAC with SHA-512 with altered plaintext" ,
"importVectorKeys step: HMAC with SHA-1 no verify usage" ,
"importVectorKeys step: HMAC with SHA-256 no verify usage" ,
"importVectorKeys step: HMAC with SHA-384 no verify usage" ,
"importVectorKeys step: HMAC with SHA-512 no verify usage" ,
"importVectorKeys step: HMAC with SHA-1 round trip" ,
"importVectorKeys step: HMAC with SHA-256 round trip" ,
"importVectorKeys step: HMAC with SHA-384 round trip" ,
"importVectorKeys step: HMAC with SHA-512 round trip" ,
"importVectorKeys step: HMAC with SHA-1 verification failure due to wrong plaintext" ,
"importVectorKeys step: HMAC with SHA-256 verification failure due to wrong plaintext" ,
"importVectorKeys step: HMAC with SHA-384 verification failure due to wrong plaintext" ,
"importVectorKeys step: HMAC with SHA-512 verification failure due to wrong plaintext" ,
"importVectorKeys step: HMAC with SHA-1 verification failure due to wrong signature" ,
"importVectorKeys step: HMAC with SHA-256 verification failure due to wrong signature" ,
"importVectorKeys step: HMAC with SHA-384 verification failure due to wrong signature" ,
"importVectorKeys step: HMAC with SHA-512 verification failure due to wrong signature" ,
"importVectorKeys step: HMAC with SHA-1 verification failure due to short signature" ,
"importVectorKeys step: HMAC with SHA-256 verification failure due to short signature" ,
"importVectorKeys step: HMAC with SHA-384 verification failure due to short signature" ,
"importVectorKeys step: HMAC with SHA-512 verification failure due to short signature"
] ,
"hmac.https.any.worker.html" : [
2021-08-03 15:24:02 -04:00
"generate wrong key step: HMAC with SHA-1 signing with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-256 signing with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-384 signing with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-512 signing with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-1 verifying with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-256 verifying with wrong algorithm name" ,
"generate wrong key step: HMAC with SHA-384 verifying with wrong algorithm name" ,
2021-08-13 17:20:44 -04:00
"generate wrong key step: HMAC with SHA-512 verifying with wrong algorithm name" ,
"importVectorKeys step: HMAC with SHA-1 verification" ,
"importVectorKeys step: HMAC with SHA-256 verification" ,
"importVectorKeys step: HMAC with SHA-384 verification" ,
"importVectorKeys step: HMAC with SHA-512 verification" ,
"importVectorKeys step: HMAC with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: HMAC with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: HMAC with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: HMAC with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: HMAC with SHA-1 with altered plaintext" ,
"importVectorKeys step: HMAC with SHA-256 with altered plaintext" ,
"importVectorKeys step: HMAC with SHA-384 with altered plaintext" ,
"importVectorKeys step: HMAC with SHA-512 with altered plaintext" ,
"importVectorKeys step: HMAC with SHA-1 no verify usage" ,
"importVectorKeys step: HMAC with SHA-256 no verify usage" ,
"importVectorKeys step: HMAC with SHA-384 no verify usage" ,
"importVectorKeys step: HMAC with SHA-512 no verify usage" ,
"importVectorKeys step: HMAC with SHA-1 round trip" ,
"importVectorKeys step: HMAC with SHA-256 round trip" ,
"importVectorKeys step: HMAC with SHA-384 round trip" ,
"importVectorKeys step: HMAC with SHA-512 round trip" ,
"importVectorKeys step: HMAC with SHA-1 verification failure due to wrong plaintext" ,
"importVectorKeys step: HMAC with SHA-256 verification failure due to wrong plaintext" ,
"importVectorKeys step: HMAC with SHA-384 verification failure due to wrong plaintext" ,
"importVectorKeys step: HMAC with SHA-512 verification failure due to wrong plaintext" ,
"importVectorKeys step: HMAC with SHA-1 verification failure due to wrong signature" ,
"importVectorKeys step: HMAC with SHA-256 verification failure due to wrong signature" ,
"importVectorKeys step: HMAC with SHA-384 verification failure due to wrong signature" ,
"importVectorKeys step: HMAC with SHA-512 verification failure due to wrong signature" ,
"importVectorKeys step: HMAC with SHA-1 verification failure due to short signature" ,
"importVectorKeys step: HMAC with SHA-256 verification failure due to short signature" ,
"importVectorKeys step: HMAC with SHA-384 verification failure due to short signature" ,
"importVectorKeys step: HMAC with SHA-512 verification failure due to short signature"
2021-08-03 15:24:02 -04:00
] ,
"rsa_pkcs.https.any.html" : [
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 no verify usage" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 no verify usage" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 no verify usage" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 no verify usage" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 round trip" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 round trip" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 round trip" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 round trip" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext"
] ,
2021-10-08 11:44:38 -04:00
"rsa_pkcs.https.any.worker.html" : [
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 no verify usage" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 no verify usage" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 no verify usage" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 no verify usage" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 round trip" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 round trip" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 round trip" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 round trip" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext" ,
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext"
] ,
2021-08-03 15:24:02 -04:00
"rsa_pss.https.any.html" : [
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt round trip" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt round trip" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt round trip" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt round trip" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted round trip" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted round trip" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted round trip" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted round trip" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered plaintext"
2021-10-08 11:44:38 -04:00
] ,
"rsa_pss.https.any.worker.html" : [
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification with altered signature after call" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted with altered plaintext after call" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted using privateKey to verify" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted using publicKey to sign" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted no verify usage" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt round trip" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt round trip" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt round trip" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt round trip" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted round trip" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted round trip" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted round trip" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted round trip" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted signing with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification with wrong algorithm name" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered signature" ,
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered plaintext" ,
"importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered plaintext"
2021-08-03 15:24:02 -04:00
]
2021-06-04 14:46:44 -04:00
} ,
"wrapKey_unwrapKey" : {
2021-10-08 11:44:38 -04:00
"wrapKey_unwrapKey.https.any.html" : false ,
"wrapKey_unwrapKey.https.any.worker.html" : false
2021-09-25 09:27:34 -04:00
}
2021-01-27 09:06:18 -05:00
} ,
"console" : {
2021-05-09 10:32:30 -04:00
"console-is-a-namespace.any.html" : true ,
2021-10-08 11:44:38 -04:00
"console-is-a-namespace.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"console-label-conversion.any.html" : true ,
2021-10-08 11:44:38 -04:00
"console-label-conversion.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"console-namespace-object-class-string.any.html" : true ,
2021-10-08 11:44:38 -04:00
"console-namespace-object-class-string.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"console-tests-historical.any.html" : true ,
2021-10-08 11:44:38 -04:00
"console-tests-historical.any.worker.html" : true ,
"idlharness.any.html" : true ,
"idlharness.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
"dom" : {
"abort" : {
2021-09-25 09:27:34 -04:00
"AbortSignal.any.html" : true ,
"AbortSignal.any.worker.html" : true ,
2021-10-08 11:44:38 -04:00
"event.any.html" : true ,
"event.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
"events" : {
2021-09-25 09:27:34 -04:00
"AddEventListenerOptions-once.any.html" : [
"Once listener should be added / removed like normal listeners"
] ,
"AddEventListenerOptions-once.any.worker.html" : [
"Once listener should be added / removed like normal listeners"
] ,
"AddEventListenerOptions-passive.any.html" : [
"Supports passive option on addEventListener only" ,
"preventDefault should be ignored if-and-only-if the passive option is true" ,
"returnValue should be ignored if-and-only-if the passive option is true" ,
"passive behavior of one listener should be unaffected by the presence of other listeners" ,
"Equivalence of option values"
] ,
"AddEventListenerOptions-passive.any.worker.html" : [
"Supports passive option on addEventListener only" ,
"preventDefault should be ignored if-and-only-if the passive option is true" ,
"returnValue should be ignored if-and-only-if the passive option is true" ,
"passive behavior of one listener should be unaffected by the presence of other listeners" ,
"Equivalence of option values"
] ,
2021-07-10 10:13:58 -04:00
"AddEventListenerOptions-signal.any.html" : true ,
2021-10-08 11:44:38 -04:00
"AddEventListenerOptions-signal.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"Event-isTrusted.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Event-isTrusted.any.worker.html" : true ,
2021-09-25 09:27:34 -04:00
"EventTarget-add-remove-listener.any.html" : true ,
"EventTarget-add-remove-listener.any.worker.html" : true ,
"EventTarget-addEventListener.any.html" : true ,
"EventTarget-addEventListener.any.worker.html" : true ,
"EventTarget-removeEventListener.any.html" : [
"removing a null event listener should succeed"
] ,
"EventTarget-removeEventListener.any.worker.html" : [
"removing a null event listener should succeed"
] ,
2021-05-09 10:32:30 -04:00
"EventTarget-constructible.any.html" : true ,
2021-10-08 11:44:38 -04:00
"EventTarget-constructible.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"Event-constructors.any.html" : [
2021-02-13 09:58:12 -05:00
"Untitled 2" ,
"Untitled 3"
2021-10-08 11:44:38 -04:00
] ,
"Event-constructors.any.worker.html" : [
"Event constructors 2" ,
"Event constructors 3"
] ,
"event-global.worker.html" : true
2021-04-26 07:02:49 -04:00
}
2021-01-27 09:06:18 -05:00
} ,
"encoding" : {
2021-05-09 10:32:30 -04:00
"api-basics.any.html" : true ,
2021-10-08 11:44:38 -04:00
"api-basics.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"api-invalid-label.any.html?1-1000" : true ,
"api-invalid-label.any.html?1001-2000" : true ,
"api-invalid-label.any.html?2001-3000" : true ,
"api-invalid-label.any.html?3001-last" : true ,
2021-10-08 11:44:38 -04:00
"api-invalid-label.any.worker.html?1-1000" : true ,
"api-invalid-label.any.worker.html?1001-2000" : true ,
"api-invalid-label.any.worker.html?2001-3000" : true ,
"api-invalid-label.any.worker.html?3001-last" : true ,
2021-05-09 10:32:30 -04:00
"api-replacement-encodings.any.html" : true ,
2021-10-08 11:44:38 -04:00
"api-replacement-encodings.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"api-surrogates-utf8.any.html" : true ,
2021-10-08 11:44:38 -04:00
"api-surrogates-utf8.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"encodeInto.any.html" : [
2021-07-02 03:32:48 -04:00
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler random"
2021-01-27 09:06:18 -05:00
] ,
2021-10-08 11:44:38 -04:00
"encodeInto.any.worker.html" : [
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler random" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler 0" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler 0" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler 128" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler 128" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler random" ,
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler random"
] ,
2021-06-05 21:23:16 -04:00
"idlharness.any.html" : true ,
2021-10-08 11:44:38 -04:00
"idlharness.any.worker.html" : true ,
2021-06-05 17:10:07 -04:00
"iso-2022-jp-decoder.any.html" : true ,
2021-10-08 11:44:38 -04:00
"iso-2022-jp-decoder.any.worker.html" : true ,
2021-01-27 09:06:18 -05:00
"legacy-mb-schinese" : {
"gb18030" : {
2021-10-08 11:44:38 -04:00
"gb18030-decoder.any.html" : true ,
"gb18030-decoder.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
"gbk" : {
2021-10-08 11:44:38 -04:00
"gbk-decoder.any.html" : true ,
"gbk-decoder.any.worker.html" : true
2021-01-27 09:06:18 -05:00
}
} ,
2021-05-09 10:32:30 -04:00
"replacement-encodings.any.html" : false ,
2021-10-08 11:44:38 -04:00
"replacement-encodings.any.worker.html" : false ,
2021-01-27 09:06:18 -05:00
"streams" : {
2021-06-05 21:23:16 -04:00
"backpressure.any.html" : true ,
2021-10-08 11:44:38 -04:00
"backpressure.any.worker.html" : true ,
2021-06-05 21:23:16 -04:00
"decode-attributes.any.html" : true ,
2021-10-08 11:44:38 -04:00
"decode-attributes.any.worker.html" : true ,
2021-06-05 21:23:16 -04:00
"decode-bad-chunks.any.html" : true ,
2021-10-08 11:44:38 -04:00
"decode-bad-chunks.any.worker.html" : true ,
2021-06-05 21:23:16 -04:00
"decode-ignore-bom.any.html" : true ,
2021-10-08 11:44:38 -04:00
"decode-ignore-bom.any.worker.html" : true ,
2021-06-05 21:23:16 -04:00
"decode-incomplete-input.any.html" : true ,
2021-10-08 11:44:38 -04:00
"decode-incomplete-input.any.worker.html" : true ,
2021-06-05 21:23:16 -04:00
"decode-non-utf8.any.html" : true ,
2021-10-08 11:44:38 -04:00
"decode-non-utf8.any.worker.html" : true ,
2021-06-05 21:23:16 -04:00
"decode-split-character.any.html" : true ,
2021-10-08 11:44:38 -04:00
"decode-split-character.any.worker.html" : true ,
2021-10-28 17:17:27 -04:00
"decode-utf8.any.html" : true ,
"decode-utf8.any.worker.html" : true ,
2021-06-05 21:23:16 -04:00
"encode-bad-chunks.any.html" : true ,
2021-10-08 11:44:38 -04:00
"encode-bad-chunks.any.worker.html" : true ,
2021-06-05 21:23:16 -04:00
"encode-utf8.any.html" : true ,
2021-10-08 11:44:38 -04:00
"encode-utf8.any.worker.html" : true ,
"readable-writable-properties.any.html" : true ,
"readable-writable-properties.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
2021-06-01 05:24:16 -04:00
"textdecoder-arguments.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-arguments.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"textdecoder-byte-order-marks.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-byte-order-marks.any.worker.html" : true ,
2021-06-05 17:10:07 -04:00
"textdecoder-copy.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-copy.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"textdecoder-fatal-single-byte.any.html?1-1000" : true ,
"textdecoder-fatal-single-byte.any.html?1001-2000" : true ,
"textdecoder-fatal-single-byte.any.html?2001-3000" : true ,
"textdecoder-fatal-single-byte.any.html?3001-4000" : true ,
"textdecoder-fatal-single-byte.any.html?4001-5000" : true ,
"textdecoder-fatal-single-byte.any.html?5001-6000" : true ,
"textdecoder-fatal-single-byte.any.html?6001-7000" : true ,
"textdecoder-fatal-single-byte.any.html?7001-last" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-fatal-single-byte.any.worker.html?1-1000" : true ,
"textdecoder-fatal-single-byte.any.worker.html?1001-2000" : true ,
"textdecoder-fatal-single-byte.any.worker.html?2001-3000" : true ,
"textdecoder-fatal-single-byte.any.worker.html?3001-4000" : true ,
"textdecoder-fatal-single-byte.any.worker.html?4001-5000" : true ,
"textdecoder-fatal-single-byte.any.worker.html?5001-6000" : true ,
"textdecoder-fatal-single-byte.any.worker.html?6001-7000" : true ,
"textdecoder-fatal-single-byte.any.worker.html?7001-last" : true ,
2021-06-05 17:10:07 -04:00
"textdecoder-fatal-streaming.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-fatal-streaming.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"textdecoder-fatal.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-fatal.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"textdecoder-ignorebom.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-ignorebom.any.worker.html" : true ,
2021-10-29 01:01:42 -04:00
"textdecoder-labels.any.html" : true ,
"textdecoder-labels.any.worker.html" : true ,
2021-06-01 05:24:16 -04:00
"textdecoder-streaming.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-streaming.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"textdecoder-utf16-surrogates.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-utf16-surrogates.any.worker.html" : true ,
2021-06-05 17:10:07 -04:00
"textencoder-constructor-non-utf.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textencoder-constructor-non-utf.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"textencoder-utf16-surrogates.any.html" : true ,
2021-10-08 11:44:38 -04:00
"textencoder-utf16-surrogates.any.worker.html" : true ,
2021-06-07 13:16:27 -04:00
"unsupported-encodings.any.html" : false ,
2021-10-08 11:44:38 -04:00
"unsupported-encodings.any.worker.html" : false ,
2021-07-03 15:34:48 -04:00
"single-byte-decoder.window.html?TextDecoder" : true ,
2021-10-08 11:44:38 -04:00
"textdecoder-eof.any.html" : true ,
"textdecoder-eof.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
"hr-time" : {
2021-05-09 10:32:30 -04:00
"monotonic-clock.any.html" : true ,
2021-10-08 11:44:38 -04:00
"monotonic-clock.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"basic.any.html" : [
"Performance interface extends EventTarget."
] ,
2021-10-08 11:44:38 -04:00
"basic.any.worker.html" : [
"Performance interface extends EventTarget."
] ,
2021-05-09 10:32:30 -04:00
"idlharness.any.html" : [
2021-04-26 07:02:49 -04:00
"Performance interface: existence and properties of interface object" ,
"Performance interface: existence and properties of interface prototype object" ,
"Performance interface: attribute timeOrigin" ,
"Performance interface: performance must inherit property \"timeOrigin\" with the proper type" ,
"Performance interface: default toJSON operation on performance" ,
"Window interface: attribute performance"
2021-06-18 05:14:14 -04:00
] ,
2021-10-08 11:44:38 -04:00
"idlharness.any.worker.html" : [
"Performance interface: existence and properties of interface object" ,
"Performance interface: existence and properties of interface prototype object" ,
"Performance interface: attribute timeOrigin" ,
"Performance interface: performance must inherit property \"timeOrigin\" with the proper type" ,
"Performance interface: default toJSON operation on performance" ,
"WorkerGlobalScope interface: attribute performance" ,
"WorkerGlobalScope interface: self must inherit property \"performance\" with the proper type"
] ,
2021-06-18 05:14:14 -04:00
"window-worker-timeOrigin.window.html" : false
2021-01-27 09:06:18 -05:00
} ,
"streams" : {
2021-05-09 10:32:30 -04:00
"idlharness.any.html" : [
2021-09-25 09:27:34 -04:00
"WritableStreamDefaultController interface: attribute abortReason" ,
"WritableStreamDefaultController interface: attribute signal" ,
"WritableStreamDefaultController interface: self.writableStreamDefaultController must inherit property \"abortReason\" with the proper type" ,
"WritableStreamDefaultController interface: self.writableStreamDefaultController must inherit property \"signal\" with the proper type"
2021-04-26 07:02:49 -04:00
] ,
2021-10-08 11:44:38 -04:00
"idlharness.any.worker.html" : [
"WritableStreamDefaultController interface: attribute abortReason" ,
"WritableStreamDefaultController interface: attribute signal" ,
"WritableStreamDefaultController interface: self.writableStreamDefaultController must inherit property \"abortReason\" with the proper type" ,
"WritableStreamDefaultController interface: self.writableStreamDefaultController must inherit property \"signal\" with the proper type"
] ,
2021-01-27 09:06:18 -05:00
"piping" : {
2021-06-15 07:46:02 -04:00
"abort.any.html" : true ,
2021-10-08 11:44:38 -04:00
"abort.any.worker.html" : true ,
2021-06-15 07:46:02 -04:00
"close-propagation-backward.any.html" : true ,
2021-10-08 11:44:38 -04:00
"close-propagation-backward.any.worker.html" : true ,
2021-06-15 07:46:02 -04:00
"close-propagation-forward.any.html" : true ,
2021-10-08 11:44:38 -04:00
"close-propagation-forward.any.worker.html" : true ,
2021-06-15 07:46:02 -04:00
"error-propagation-backward.any.html" : true ,
2021-10-08 11:44:38 -04:00
"error-propagation-backward.any.worker.html" : true ,
2021-06-15 07:46:02 -04:00
"error-propagation-forward.any.html" : true ,
2021-10-08 11:44:38 -04:00
"error-propagation-forward.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"flow-control.any.html" : true ,
2021-10-08 11:44:38 -04:00
"flow-control.any.worker.html" : true ,
2021-06-15 07:46:02 -04:00
"general.any.html" : true ,
2021-10-08 11:44:38 -04:00
"general.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"multiple-propagation.any.html" : true ,
2021-10-08 11:44:38 -04:00
"multiple-propagation.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"pipe-through.any.html" : true ,
2021-10-08 11:44:38 -04:00
"pipe-through.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"then-interception.any.html" : true ,
2021-10-08 11:44:38 -04:00
"then-interception.any.worker.html" : true ,
2021-06-15 07:46:02 -04:00
"throwing-options.any.html" : true ,
2021-10-08 11:44:38 -04:00
"throwing-options.any.worker.html" : true ,
"transform-streams.any.html" : true ,
"transform-streams.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
2021-05-09 10:32:30 -04:00
"queuing-strategies.any.html" : true ,
2021-10-08 11:44:38 -04:00
"queuing-strategies.any.worker.html" : true ,
2021-01-27 09:06:18 -05:00
"readable-byte-streams" : {
2021-11-03 05:47:40 -04:00
"bad-buffers-and-views.any.html" : true ,
"bad-buffers-and-views.any.worker.html" : true ,
"construct-byob-request.any.html" : true ,
"construct-byob-request.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"general.any.html" : [
2021-11-03 05:47:40 -04:00
"ReadableStream with byte source: Respond to multiple pull() by separate enqueue()"
2021-06-05 13:29:41 -04:00
] ,
2021-10-08 11:44:38 -04:00
"general.any.worker.html" : [
2021-11-03 05:47:40 -04:00
"ReadableStream with byte source: Respond to multiple pull() by separate enqueue()"
2021-10-08 11:44:38 -04:00
] ,
2021-06-15 07:46:02 -04:00
"non-transferable-buffers.any.html" : false ,
2021-10-08 11:44:38 -04:00
"non-transferable-buffers.any.worker.html" : false ,
2021-07-19 07:46:02 -04:00
"enqueue-with-detached-buffer.window.html" : false ,
2021-11-03 05:47:40 -04:00
"tee.any.html" : true ,
"tee.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
"readable-streams" : {
2021-07-12 15:15:07 -04:00
"async-iterator.any.html" : false ,
2021-05-09 10:32:30 -04:00
"bad-strategies.any.html" : true ,
2021-10-08 11:44:38 -04:00
"bad-strategies.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"bad-underlying-sources.any.html" : true ,
2021-10-08 11:44:38 -04:00
"bad-underlying-sources.any.worker.html" : true ,
2021-06-15 11:48:25 -04:00
"cancel.any.html" : true ,
2021-10-08 11:44:38 -04:00
"cancel.any.worker.html" : true ,
2021-06-15 07:46:02 -04:00
"constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"count-queuing-strategy-integration.any.html" : true ,
2021-10-08 11:44:38 -04:00
"count-queuing-strategy-integration.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"default-reader.any.html" : true ,
2021-10-08 11:44:38 -04:00
"default-reader.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"floating-point-total-queue-size.any.html" : true ,
2021-10-08 11:44:38 -04:00
"floating-point-total-queue-size.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"garbage-collection.any.html" : true ,
2021-10-08 11:44:38 -04:00
"garbage-collection.any.worker.html" : true ,
2021-06-15 11:48:25 -04:00
"general.any.html" : true ,
2021-10-08 11:44:38 -04:00
"general.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"patched-global.any.html" : true ,
2021-10-08 11:44:38 -04:00
"patched-global.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"reentrant-strategies.any.html" : true ,
2021-10-08 11:44:38 -04:00
"reentrant-strategies.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"tee.any.html" : false ,
2021-10-08 11:44:38 -04:00
"tee.any.worker.html" : false ,
"templated.any.html" : true ,
"templated.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
"transform-streams" : {
2021-05-09 10:32:30 -04:00
"backpressure.any.html" : true ,
2021-10-08 11:44:38 -04:00
"backpressure.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"errors.any.html" : true ,
2021-10-08 11:44:38 -04:00
"errors.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"flush.any.html" : true ,
2021-10-08 11:44:38 -04:00
"flush.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"general.any.html" : true ,
2021-10-08 11:44:38 -04:00
"general.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"lipfuzz.any.html" : true ,
2021-10-08 11:44:38 -04:00
"lipfuzz.any.worker.html" : true ,
2021-06-15 11:48:25 -04:00
"patched-global.any.html" : true ,
2021-10-08 11:44:38 -04:00
"patched-global.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"properties.any.html" : true ,
2021-10-08 11:44:38 -04:00
"properties.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"reentrant-strategies.any.html" : true ,
2021-10-08 11:44:38 -04:00
"reentrant-strategies.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"strategies.any.html" : true ,
2021-10-08 11:44:38 -04:00
"strategies.any.worker.html" : true ,
"terminate.any.html" : true ,
"terminate.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
"writable-streams" : {
2021-07-03 15:34:48 -04:00
"aborting.any.html" : [
"WritableStreamDefaultController.signal" ,
"the abort signal is signalled synchronously - write" ,
"the abort signal is signalled synchronously - close" ,
"the abort signal is not signalled on error" ,
"the abort signal is not signalled on write failure" ,
"the abort signal is not signalled on close failure" ,
"recursive abort() call"
] ,
2021-10-08 11:44:38 -04:00
"aborting.any.worker.html" : [
"WritableStreamDefaultController.signal" ,
"the abort signal is signalled synchronously - write" ,
"the abort signal is signalled synchronously - close" ,
"the abort signal is not signalled on error" ,
"the abort signal is not signalled on write failure" ,
"the abort signal is not signalled on close failure" ,
"recursive abort() call"
] ,
2021-06-15 07:46:02 -04:00
"bad-strategies.any.html" : true ,
2021-10-08 11:44:38 -04:00
"bad-strategies.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"bad-underlying-sinks.any.html" : true ,
2021-10-08 11:44:38 -04:00
"bad-underlying-sinks.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"byte-length-queuing-strategy.any.html" : true ,
2021-10-08 11:44:38 -04:00
"byte-length-queuing-strategy.any.worker.html" : true ,
2021-06-15 20:46:08 -04:00
"close.any.html" : [
"when close is called on a WritableStream in waiting state, ready should be fulfilled immediately even if close takes a long time"
] ,
2021-10-08 11:44:38 -04:00
"close.any.worker.html" : [
"when close is called on a WritableStream in waiting state, ready should be fulfilled immediately even if close takes a long time"
] ,
2021-06-15 07:46:02 -04:00
"constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"count-queuing-strategy.any.html" : true ,
2021-10-08 11:44:38 -04:00
"count-queuing-strategy.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"error.any.html" : true ,
2021-10-08 11:44:38 -04:00
"error.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"floating-point-total-queue-size.any.html" : true ,
2021-10-08 11:44:38 -04:00
"floating-point-total-queue-size.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"general.any.html" : true ,
2021-10-08 11:44:38 -04:00
"general.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"properties.any.html" : true ,
2021-10-08 11:44:38 -04:00
"properties.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"reentrant-strategy.any.html" : true ,
2021-10-08 11:44:38 -04:00
"reentrant-strategy.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"start.any.html" : true ,
2021-10-08 11:44:38 -04:00
"start.any.worker.html" : true ,
"write.any.html" : true ,
"write.any.worker.html" : true
2021-06-15 07:46:02 -04:00
} ,
"queuing-strategies-size-function-per-global.window.html" : false ,
"transferable" : {
"deserialize-error.window.html" : false
2021-01-27 09:06:18 -05:00
}
} ,
"user-timing" : {
2021-05-09 10:32:30 -04:00
"buffered-flag.any.html" : false ,
2021-10-08 11:44:38 -04:00
"buffered-flag.any.worker.html" : false ,
2021-05-09 10:32:30 -04:00
"case-sensitivity.any.html" : false ,
2021-10-08 11:44:38 -04:00
"case-sensitivity.any.worker.html" : false ,
2021-05-09 10:32:30 -04:00
"clear_all_marks.any.html" : true ,
2021-10-08 11:44:38 -04:00
"clear_all_marks.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"clear_all_measures.any.html" : true ,
2021-10-08 11:44:38 -04:00
"clear_all_measures.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"clear_non_existent_mark.any.html" : true ,
2021-10-08 11:44:38 -04:00
"clear_non_existent_mark.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"clear_non_existent_measure.any.html" : true ,
2021-10-08 11:44:38 -04:00
"clear_non_existent_measure.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"clear_one_mark.any.html" : true ,
2021-10-08 11:44:38 -04:00
"clear_one_mark.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"clear_one_measure.any.html" : true ,
2021-10-08 11:44:38 -04:00
"clear_one_measure.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"entry_type.any.html" : true ,
2021-10-08 11:44:38 -04:00
"entry_type.any.worker.html" : true ,
2021-07-05 07:17:11 -04:00
"idlharness.any.html" : true ,
2021-10-08 11:44:38 -04:00
"idlharness.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"mark-entry-constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"mark-entry-constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"mark-errors.any.html" : true ,
2021-10-08 11:44:38 -04:00
"mark-errors.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"mark-l3.any.html" : false ,
2021-10-08 11:44:38 -04:00
"mark-l3.any.worker.html" : false ,
2021-05-09 10:32:30 -04:00
"mark-measure-return-objects.any.html" : true ,
2021-10-08 11:44:38 -04:00
"mark-measure-return-objects.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"mark.any.html" : true ,
2021-10-08 11:44:38 -04:00
"mark.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"measure-l3.any.html" : true ,
2021-10-08 11:44:38 -04:00
"measure-l3.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"measure-with-dict.any.html" : [
2021-01-27 09:06:18 -05:00
"measure entries' detail and start/end are customizable"
] ,
2021-10-08 11:44:38 -04:00
"measure-with-dict.any.worker.html" : [
"measure entries' detail and start/end are customizable"
] ,
2021-05-09 10:32:30 -04:00
"measure_syntax_err.any.html" : true ,
2021-10-08 11:44:38 -04:00
"measure_syntax_err.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"structured-serialize-detail.any.html" : true ,
2021-10-08 11:44:38 -04:00
"structured-serialize-detail.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"supported-usertiming-types.any.html" : false ,
2021-10-08 11:44:38 -04:00
"supported-usertiming-types.any.worker.html" : false ,
"user_timing_exists.any.html" : true ,
"user_timing_exists.any.worker.html" : true ,
"invoke_with_timing_attributes.worker.html" : true ,
"performance-measure-invalid.worker.html" : false
2021-01-27 09:06:18 -05:00
} ,
"wasm" : {
"jsapi" : {
"constructor" : {
2021-05-09 10:32:30 -04:00
"compile.any.html" : true ,
2021-10-08 11:44:38 -04:00
"compile.any.worker.html" : true ,
2021-06-06 12:32:06 -04:00
"instantiate-bad-imports.any.html" : true ,
2021-10-08 11:44:38 -04:00
"instantiate-bad-imports.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"instantiate.any.html" : [
2021-01-27 09:06:18 -05:00
"Synchronous options handling: Buffer argument"
] ,
2021-10-08 11:44:38 -04:00
"instantiate.any.worker.html" : [
"Synchronous options handling: Buffer argument"
] ,
2021-05-09 10:32:30 -04:00
"multi-value.any.html" : true ,
2021-10-08 11:44:38 -04:00
"multi-value.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"toStringTag.any.html" : true ,
2021-10-08 11:44:38 -04:00
"toStringTag.any.worker.html" : true ,
"validate.any.html" : true ,
"validate.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
"global" : {
2021-05-09 10:32:30 -04:00
"constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"toString.any.html" : true ,
2021-10-08 11:44:38 -04:00
"toString.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"type.tentative.any.html" : false ,
2021-10-08 11:44:38 -04:00
"type.tentative.any.worker.html" : false ,
2021-05-09 10:32:30 -04:00
"value-get-set.any.html" : true ,
2021-10-08 11:44:38 -04:00
"value-get-set.any.worker.html" : true ,
"valueOf.any.html" : true ,
"valueOf.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
2021-05-09 10:32:30 -04:00
"idlharness.any.html" : [
2021-04-26 07:02:49 -04:00
"Table interface: operation set(unsigned long, optional any)"
] ,
2021-10-08 11:44:38 -04:00
"idlharness.any.worker.html" : [
"Table interface: operation set(unsigned long, optional any)"
] ,
2021-01-27 09:06:18 -05:00
"instance" : {
2021-06-06 12:32:06 -04:00
"constructor-bad-imports.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor-bad-imports.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"constructor-caching.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor-caching.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor.any.worker.html" : true ,
2021-06-06 12:32:06 -04:00
"exports.any.html" : true ,
2021-10-08 11:44:38 -04:00
"exports.any.worker.html" : true ,
"toString.any.html" : true ,
"toString.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
2021-06-06 12:32:06 -04:00
"interface.any.html" : true ,
2021-10-08 11:44:38 -04:00
"interface.any.worker.html" : true ,
2021-01-27 09:06:18 -05:00
"memory" : {
2021-06-06 12:32:06 -04:00
"buffer.any.html" : true ,
2021-10-08 11:44:38 -04:00
"buffer.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"grow.any.html" : true ,
2021-10-08 11:44:38 -04:00
"grow.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"toString.any.html" : true ,
2021-10-08 11:44:38 -04:00
"toString.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"type.tentative.any.html" : false ,
2021-10-08 11:44:38 -04:00
"type.tentative.any.worker.html" : false ,
2021-05-09 10:32:30 -04:00
"constructor-shared.tentative.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor-shared.tentative.any.worker.html" : true ,
"constructor-types.tentative.any.html" : false ,
"constructor-types.tentative.any.worker.html" : false
2021-01-27 09:06:18 -05:00
} ,
"module" : {
2021-05-09 10:32:30 -04:00
"constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"customSections.any.html" : true ,
2021-10-08 11:44:38 -04:00
"customSections.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"exports.any.html" : true ,
2021-10-08 11:44:38 -04:00
"exports.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"imports.any.html" : true ,
2021-10-08 11:44:38 -04:00
"imports.any.worker.html" : true ,
"toString.any.html" : true ,
"toString.any.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
2021-10-27 17:26:15 -04:00
"prototypes.any.html" : true ,
"prototypes.any.worker.html" : true ,
2021-01-27 09:06:18 -05:00
"table" : {
2021-10-27 17:26:15 -04:00
"constructor.any.html" : true ,
"constructor.any.worker.html" : true ,
"get-set.any.html" : true ,
"get-set.any.worker.html" : true ,
"grow.any.html" : true ,
"grow.any.worker.html" : true ,
2021-09-25 09:27:34 -04:00
"length.any.html" : true ,
2021-10-08 11:44:38 -04:00
"length.any.worker.html" : true ,
2021-09-25 09:27:34 -04:00
"toString.any.html" : true ,
2021-10-08 11:44:38 -04:00
"toString.any.worker.html" : true ,
2021-06-05 13:29:41 -04:00
"constructor-types.tentative.any.html" : false ,
2021-10-08 11:44:38 -04:00
"constructor-types.tentative.any.worker.html" : false ,
"type.tentative.any.html" : false ,
"type.tentative.any.worker.html" : false
2021-07-19 07:46:02 -04:00
} ,
"exception" : {
2021-10-27 17:26:15 -04:00
"basic.tentative.any.html" : true ,
"basic.tentative.any.worker.html" : true ,
2021-10-12 07:30:39 -04:00
"constructor.tentative.any.html" : true ,
"constructor.tentative.any.worker.html" : true ,
"getArg.tentative.any.html" : true ,
"getArg.tentative.any.worker.html" : true ,
"is.tentative.any.html" : true ,
"is.tentative.any.worker.html" : true ,
2021-07-19 07:46:02 -04:00
"toString.tentative.any.html" : false ,
2021-10-08 11:44:38 -04:00
"toString.tentative.any.worker.html" : false ,
"type.tentative.any.html" : false ,
"type.tentative.any.worker.html" : false
2021-07-19 07:46:02 -04:00
} ,
"tag" : {
2021-10-12 07:30:39 -04:00
"constructor.tentative.any.html" : true ,
"constructor.tentative.any.worker.html" : true ,
"toString.tentative.any.html" : true ,
"toString.tentative.any.worker.html" : true ,
2021-10-08 11:44:38 -04:00
"type.tentative.any.html" : false ,
"type.tentative.any.worker.html" : false
2021-09-08 05:14:29 -04:00
} ,
"function" : {
"call.tentative.any.html" : false ,
2021-10-08 11:44:38 -04:00
"call.tentative.any.worker.html" : false ,
2021-09-08 05:14:29 -04:00
"constructor.tentative.any.html" : [
2021-09-25 09:27:34 -04:00
"name" ,
"length" ,
"Too few arguments" ,
"Calling" ,
"construct with JS function" ,
"fail with missing results" ,
"fail with missing parameters" ,
"fail with non-string parameters & results" ,
"fail with non-existent parameter and result type" ,
"fail with non-function object" ,
"fail to construct with non-callable object"
2021-09-08 05:14:29 -04:00
] ,
2021-10-08 11:44:38 -04:00
"constructor.tentative.any.worker.html" : [
"name" ,
"length" ,
"Too few arguments" ,
"Calling" ,
"construct with JS function" ,
"fail with missing results" ,
"fail with missing parameters" ,
"fail with non-string parameters & results" ,
"fail with non-existent parameter and result type" ,
"fail with non-function object" ,
"fail to construct with non-callable object"
] ,
2021-09-08 05:14:29 -04:00
"table.tentative.any.html" : false ,
2021-10-08 11:44:38 -04:00
"table.tentative.any.worker.html" : false ,
"type.tentative.any.html" : false ,
"type.tentative.any.worker.html" : false
2021-01-27 09:06:18 -05:00
}
} ,
"serialization" : {
"module" : {
2021-05-09 10:32:30 -04:00
"serialization-via-idb.any.html" : false ,
2021-10-08 11:44:38 -04:00
"serialization-via-idb.any.worker.html" : false ,
2021-09-07 17:50:22 -04:00
"serialization-via-notifications-api.any.html" : false ,
2021-10-08 11:44:38 -04:00
"serialization-via-notifications-api.any.worker.html" : false ,
2021-09-29 04:47:24 -04:00
"nested-worker-success.any.worker.html" : true
2021-07-19 07:46:02 -04:00
} ,
"arraybuffer" : {
"transfer.window.html" : false
2021-01-27 09:06:18 -05:00
}
} ,
"webapi" : {
2021-07-03 17:33:36 -04:00
"abort.any.html" : true ,
2021-10-08 11:44:38 -04:00
"abort.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"body.any.html" : true ,
2021-10-08 11:44:38 -04:00
"body.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"contenttype.any.html" : true ,
2021-10-08 11:44:38 -04:00
"contenttype.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"empty-body.any.html" : true ,
2021-10-08 11:44:38 -04:00
"empty-body.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"historical.any.html" : false ,
2021-10-08 11:44:38 -04:00
"historical.any.worker.html" : false ,
2021-07-03 17:33:36 -04:00
"idlharness.any.html" : true ,
2021-10-08 11:44:38 -04:00
"idlharness.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"instantiateStreaming-bad-imports.any.html" : true ,
2021-10-08 11:44:38 -04:00
"instantiateStreaming-bad-imports.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"instantiateStreaming.any.html" : true ,
2021-10-08 11:44:38 -04:00
"instantiateStreaming.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"invalid-args.any.html" : true ,
2021-10-08 11:44:38 -04:00
"invalid-args.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"invalid-code.any.html" : true ,
2021-10-08 11:44:38 -04:00
"invalid-code.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"modified-contenttype.any.html" : true ,
2021-10-08 11:44:38 -04:00
"modified-contenttype.any.worker.html" : true ,
2021-07-03 17:33:36 -04:00
"origin.sub.any.html" : [
"Opaque response: compileStreaming" ,
"Opaque response: instantiateStreaming"
2021-04-26 07:02:49 -04:00
] ,
2021-10-08 11:44:38 -04:00
"origin.sub.any.worker.html" : [
"Opaque response: compileStreaming" ,
"Opaque response: instantiateStreaming"
] ,
2021-07-03 17:33:36 -04:00
"rejected-arg.any.html" : true ,
2021-10-08 11:44:38 -04:00
"rejected-arg.any.worker.html" : true ,
"status.any.html" : true ,
"status.any.worker.html" : true
2021-09-07 17:50:22 -04:00
} ,
"create_multiple_memory.worker.html" : true
2021-01-27 09:06:18 -05:00
} ,
2021-09-25 09:27:34 -04:00
"webidl" : {
2021-01-27 09:06:18 -05:00
"ecmascript-binding" : {
"es-exceptions" : {
2021-05-09 10:32:30 -04:00
"DOMException-constants.any.html" : true ,
2021-10-08 11:44:38 -04:00
"DOMException-constants.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"DOMException-constructor-and-prototype.any.html" : true ,
2021-10-08 11:44:38 -04:00
"DOMException-constructor-and-prototype.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"DOMException-constructor-behavior.any.html" : true ,
2021-10-08 11:44:38 -04:00
"DOMException-constructor-behavior.any.worker.html" : true ,
"DOMException-custom-bindings.any.html" : true ,
"DOMException-custom-bindings.any.worker.html" : true
2021-07-04 10:08:53 -04:00
} ,
2021-09-24 13:07:22 -04:00
"class-string-interface.any.html" : true ,
2021-10-08 11:44:38 -04:00
"class-string-interface.any.worker.html" : true ,
2021-07-04 10:08:53 -04:00
"class-string-iterator-prototype-object.any.html" : true ,
2021-10-08 11:44:38 -04:00
"class-string-iterator-prototype-object.any.worker.html" : true ,
2021-09-25 09:27:34 -04:00
"class-string-named-properties-object.window.html" : [
"@@toStringTag exists with the appropriate descriptor" ,
"Object.prototype.toString"
] ,
2021-07-04 10:08:53 -04:00
"global-immutable-prototype.any.html" : [
"Setting to a different prototype"
] ,
2021-10-08 11:44:38 -04:00
"global-immutable-prototype.any.worker.html" : [
"Setting to a different prototype"
] ,
2021-07-04 10:08:53 -04:00
"global-object-implicit-this-value.any.html" : [
"Global object's getter throws when called on incompatible object" ,
"Global object's setter throws when called on incompatible object" ,
"Global object's operation throws when called on incompatible object" ,
"Global object's getter works when called on null / undefined" ,
"Global object's setter works when called on null / undefined"
] ,
2021-10-08 11:44:38 -04:00
"global-object-implicit-this-value.any.worker.html" : [
"Global object's getter throws when called on incompatible object" ,
"Global object's setter throws when called on incompatible object" ,
"Global object's operation throws when called on incompatible object" ,
"Global object's getter works when called on null / undefined" ,
"Global object's setter works when called on null / undefined"
] ,
2021-07-04 10:08:53 -04:00
"legacy-factor-function-subclass.window.html" : false ,
"no-regexp-special-casing.any.html" : [
"Conversion to a sequence works"
2021-10-08 11:44:38 -04:00
] ,
"no-regexp-special-casing.any.worker.html" : [
"Conversion to a sequence works"
2021-07-04 10:08:53 -04:00
]
} ,
2021-10-08 11:44:38 -04:00
"idlharness.any.html" : true ,
"idlharness.any.worker.html" : true
2021-01-27 16:37:15 -05:00
} ,
"url" : {
2021-05-09 10:32:30 -04:00
"historical.any.html" : [
2021-01-27 16:37:15 -05:00
"<a> and <area>.searchParams should be undefined"
] ,
2021-10-08 11:44:38 -04:00
"historical.any.worker.html" : true ,
2021-06-16 12:40:35 -04:00
"idlharness.any.html" : true ,
2021-10-08 11:44:38 -04:00
"idlharness.any.worker.html" : true ,
2021-09-25 09:27:34 -04:00
"toascii.window.html" : [
"aa-- (using <a>.host)" ,
"aa-- (using <a>.hostname)" ,
"aa-- (using <area>.host)" ,
"aa-- (using <area>.hostname)" ,
"a†-- (using <a>.host)" ,
"a†-- (using <a>.hostname)" ,
"a†-- (using <area>.host)" ,
"a†-- (using <area>.hostname)" ,
"ab--c (using <a>.host)" ,
"ab--c (using <a>.hostname)" ,
"ab--c (using <area>.host)" ,
"ab--c (using <area>.hostname)" ,
"-x (using <a>.host)" ,
"-x (using <a>.hostname)" ,
"-x (using <area>.host)" ,
"-x (using <area>.hostname)" ,
"-† (using <a>.host)" ,
"-† (using <a>.hostname)" ,
"-† (using <area>.host)" ,
"-† (using <area>.hostname)" ,
"-x.xn--nxa (using <a>.host)" ,
"-x.xn--nxa (using <a>.hostname)" ,
"-x.xn--nxa (using <area>.host)" ,
"-x.xn--nxa (using <area>.hostname)" ,
"-x.β (using <a>.host)" ,
"-x.β (using <a>.hostname)" ,
"-x.β (using <area>.host)" ,
"-x.β (using <area>.hostname)" ,
"x-.xn--nxa (using <a>.host)" ,
"x-.xn--nxa (using <a>.hostname)" ,
"x-.xn--nxa (using <area>.host)" ,
"x-.xn--nxa (using <area>.hostname)" ,
"x-.β (using <a>.host)" ,
"x-.β (using <a>.hostname)" ,
"x-.β (using <area>.host)" ,
"x-.β (using <area>.hostname)" ,
"x..xn--nxa (using <a>.host)" ,
"x..xn--nxa (using <a>.hostname)" ,
"x..xn--nxa (using <area>.host)" ,
"x..xn--nxa (using <area>.hostname)" ,
"x..β (using <a>.host)" ,
"x..β (using <a>.hostname)" ,
"x..β (using <area>.host)" ,
"x..β (using <area>.hostname)" ,
"xn--a (using <a>)" ,
"xn--a (using <a>.host)" ,
"xn--a (using <a>.hostname)" ,
"xn--a (using <area>)" ,
"xn--a (using <area>.host)" ,
"xn--a (using <area>.hostname)" ,
"xn--a.xn--nxa (using <a>)" ,
"xn--a.xn--nxa (using <a>.host)" ,
"xn--a.xn--nxa (using <a>.hostname)" ,
"xn--a.xn--nxa (using <area>)" ,
"xn--a.xn--nxa (using <area>.host)" ,
"xn--a.xn--nxa (using <area>.hostname)" ,
"xn--a.β (using <a>)" ,
"xn--a.β (using <a>.host)" ,
"xn--a.β (using <a>.hostname)" ,
"xn--a.β (using <area>)" ,
"xn--a.β (using <area>.host)" ,
"xn--a.β (using <area>.hostname)" ,
"xn--nxa.xn--nxa (using <a>.host)" ,
"xn--nxa.xn--nxa (using <a>.hostname)" ,
"xn--nxa.xn--nxa (using <area>.host)" ,
"xn--nxa.xn--nxa (using <area>.hostname)" ,
"xn--nxa.β (using <a>.host)" ,
"xn--nxa.β (using <a>.hostname)" ,
"xn--nxa.β (using <area>.host)" ,
"xn--nxa.β (using <area>.hostname)" ,
"ab--c.xn--nxa (using <a>.host)" ,
"ab--c.xn--nxa (using <a>.hostname)" ,
"ab--c.xn--nxa (using <area>.host)" ,
"ab--c.xn--nxa (using <area>.hostname)" ,
"ab--c.β (using <a>.host)" ,
"ab--c.β (using <a>.hostname)" ,
"ab--c.β (using <area>.host)" ,
"ab--c.β (using <area>.hostname)" ,
" .example (using URL)" ,
" .example (using URL.host)" ,
" .example (using URL.hostname)" ,
" .example (using <a>)" ,
" .example (using <a>.host)" ,
" .example (using <a>.hostname)" ,
" .example (using <area>)" ,
" .example (using <area>.host)" ,
" .example (using <area>.hostname)" ,
"xn--1ug.example (using URL)" ,
"xn--1ug.example (using URL.host)" ,
"xn--1ug.example (using URL.hostname)" ,
"xn--1ug.example (using <a>)" ,
"xn--1ug.example (using <a>.host)" ,
"xn--1ug.example (using <a>.hostname)" ,
"xn--1ug.example (using <area>)" ,
"xn--1ug.example (using <area>.host)" ,
"xn--1ug.example (using <area>.hostname)" ,
"يa (using <a>)" ,
"يa (using <a>.host)" ,
"يa (using <a>.hostname)" ,
"يa (using <area>)" ,
"يa (using <area>.host)" ,
"يa (using <area>.hostname)" ,
"xn--a-yoc (using <a>)" ,
"xn--a-yoc (using <a>.host)" ,
"xn--a-yoc (using <a>.hostname)" ,
"xn--a-yoc (using <area>)" ,
"xn--a-yoc (using <area>.host)" ,
"xn--a-yoc (using <area>.hostname)" ,
"ශ්රී (using <a>.host)" ,
"ශ්රී (using <a>.hostname)" ,
"ශ්රී (using <area>.host)" ,
"ශ්රී (using <area>.hostname)" ,
"نامهای (using <a>.host)" ,
"نامهای (using <a>.hostname)" ,
"نامهای (using <area>.host)" ,
"نامهای (using <area>.hostname)" ,
"<22> .com (using <a>)" ,
"<22> .com (using <a>.host)" ,
"<22> .com (using <a>.hostname)" ,
"<22> .com (using <area>)" ,
"<22> .com (using <area>.host)" ,
"<22> .com (using <area>.hostname)" ,
"xn--zn7c.com (using <a>)" ,
"xn--zn7c.com (using <a>.host)" ,
"xn--zn7c.com (using <a>.hostname)" ,
"xn--zn7c.com (using <area>)" ,
"xn--zn7c.com (using <area>.host)" ,
"xn--zn7c.com (using <area>.hostname)" ,
"x01234567890123456789012345678901234567890123456789012345678901x (using <a>.host)" ,
"x01234567890123456789012345678901234567890123456789012345678901x (using <a>.hostname)" ,
"x01234567890123456789012345678901234567890123456789012345678901x (using <area>.host)" ,
"x01234567890123456789012345678901234567890123456789012345678901x (using <area>.hostname)" ,
"x01234567890123456789012345678901234567890123456789012345678901† (using <a>.host)" ,
"x01234567890123456789012345678901234567890123456789012345678901† (using <a>.hostname)" ,
"x01234567890123456789012345678901234567890123456789012345678901† (using <area>.host)" ,
"x01234567890123456789012345678901234567890123456789012345678901† (using <area>.hostname)" ,
"x01234567890123456789012345678901234567890123456789012345678901x.xn--nxa (using <a>.host)" ,
"x01234567890123456789012345678901234567890123456789012345678901x.xn--nxa (using <a>.hostname)" ,
"x01234567890123456789012345678901234567890123456789012345678901x.xn--nxa (using <area>.host)" ,
"x01234567890123456789012345678901234567890123456789012345678901x.xn--nxa (using <area>.hostname)" ,
"x01234567890123456789012345678901234567890123456789012345678901x.β (using <a>.host)" ,
"x01234567890123456789012345678901234567890123456789012345678901x.β (using <a>.hostname)" ,
"x01234567890123456789012345678901234567890123456789012345678901x.β (using <area>.host)" ,
"x01234567890123456789012345678901234567890123456789012345678901x.β (using <area>.hostname)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.x (using <a>.host)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.x (using <a>.hostname)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.x (using <area>.host)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.x (using <area>.hostname)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.xn--nxa (using <a>.host)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.xn--nxa (using <a>.hostname)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.xn--nxa (using <area>.host)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.xn--nxa (using <area>.hostname)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.β (using <a>.host)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.β (using <a>.hostname)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.β (using <area>.host)" ,
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.β (using <area>.hostname)" ,
"a b (using <a>.host)" ,
"a b (using <a>.hostname)" ,
"a b (using <area>.host)" ,
"a b (using <area>.hostname)" ,
"a%C2%ADb (using <a>.host)" ,
"a%C2%ADb (using <a>.hostname)" ,
"a%C2%ADb (using <area>.host)" ,
"a%C2%ADb (using <area>.hostname)" ,
" (using <a>)" ,
" (using <a>.host)" ,
" (using <a>.hostname)" ,
" (using <area>)" ,
" (using <area>.host)" ,
" (using <area>.hostname)" ,
"%C2%AD (using <a>)" ,
"%C2%AD (using <a>.host)" ,
"%C2%AD (using <a>.hostname)" ,
"%C2%AD (using <area>)" ,
"%C2%AD (using <area>.host)" ,
"%C2%AD (using <area>.hostname)" ,
"xn-- (using <a>)" ,
"xn-- (using <a>.host)" ,
"xn-- (using <a>.hostname)" ,
"xn-- (using <area>)" ,
"xn-- (using <area>.host)" ,
"xn-- (using <area>.hostname)"
] ,
2021-05-09 10:32:30 -04:00
"url-constructor.any.html" : [
2021-06-21 13:53:52 -04:00
"Parsing: <foo://ho|st/> against <about:blank>" ,
"Parsing: <http://ho%7Cst/> against <about:blank>" ,
2021-06-05 13:29:41 -04:00
"Parsing: <file://%43%7C> against <about:blank>" ,
"Parsing: <file://%43|> against <about:blank>" ,
"Parsing: <file://C%7C> against <about:blank>" ,
"Parsing: <file://%43%7C/> against <about:blank>" ,
"Parsing: <https://%43%7C/> against <about:blank>" ,
"Parsing: <asdf://%43|/> against <about:blank>" ,
2021-01-27 16:37:15 -05:00
"Parsing: </> against <file://h/C:/a/b>" ,
"Parsing: <file:\\\\//> against <about:blank>" ,
"Parsing: <file:\\\\\\\\> against <about:blank>" ,
"Parsing: <file:\\\\\\\\?fox> against <about:blank>" ,
"Parsing: <file:\\\\\\\\#guppy> against <about:blank>" ,
"Parsing: <file://spider///> against <about:blank>" ,
"Parsing: <file:\\\\localhost//> against <about:blank>" ,
"Parsing: <file://\\/localhost//cat> against <about:blank>" ,
"Parsing: <file://localhost//a//../..//> against <about:blank>" ,
"Parsing: </////mouse> against <file:///elephant>" ,
"Parsing: <\\/localhost//pig> against <file://lion/>" ,
"Parsing: <//localhost//pig> against <file://lion/>" ,
2021-03-01 20:30:24 -05:00
"Parsing: </..//localhost//pig> against <file://lion/>" ,
2021-01-27 16:37:15 -05:00
"Parsing: <C|> against <file://host/dir/file>" ,
"Parsing: <C|> against <file://host/D:/dir1/dir2/file>" ,
"Parsing: <C|#> against <file://host/dir/file>" ,
"Parsing: <C|?> against <file://host/dir/file>" ,
"Parsing: <C|/> against <file://host/dir/file>" ,
"Parsing: <C|\n/> against <file://host/dir/file>" ,
"Parsing: <C|\\> against <file://host/dir/file>" ,
"Parsing: </c:/foo/bar> against <file://host/path>" ,
"Parsing: <file://example.net/C:/> against <about:blank>" ,
"Parsing: <file://1.2.3.4/C:/> against <about:blank>" ,
"Parsing: <file://[1::8]/C:/> against <about:blank>" ,
2021-04-14 16:49:16 -04:00
"Parsing: <C|/> against <file://host/>" ,
"Parsing: </C:/> against <file://host/>" ,
"Parsing: <file:C:/> against <file://host/>" ,
"Parsing: <file:/C:/> against <file://host/>" ,
2021-01-27 16:37:15 -05:00
"Parsing: <file://localhost//a//../..//foo> against <about:blank>" ,
"Parsing: <file://localhost////foo> against <about:blank>" ,
"Parsing: <file:////foo> against <about:blank>" ,
"Parsing: <file:////one/two> against <file:///>" ,
"Parsing: <////one/two> against <file:///>" ,
2021-03-01 20:30:24 -05:00
"Parsing: <file:///.//> against <file:////>" ,
2021-01-27 16:37:15 -05:00
"Parsing: <file:.//p> against <about:blank>" ,
2021-03-01 20:30:24 -05:00
"Parsing: <file:/.//p> against <about:blank>" ,
2021-01-27 16:37:15 -05:00
"Parsing: <non-spec:/.//> against <about:blank>" ,
"Parsing: <non-spec:/..//> against <about:blank>" ,
"Parsing: <non-spec:/a/..//> against <about:blank>" ,
"Parsing: <non-spec:/.//path> against <about:blank>" ,
"Parsing: <non-spec:/..//path> against <about:blank>" ,
"Parsing: <non-spec:/a/..//path> against <about:blank>" ,
"Parsing: </.//path> against <non-spec:/p>" ,
"Parsing: </..//path> against <non-spec:/p>" ,
"Parsing: <..//path> against <non-spec:/p>" ,
"Parsing: <a/..//path> against <non-spec:/p>" ,
"Parsing: <> against <non-spec:/..//p>" ,
2021-08-09 12:49:31 -04:00
"Parsing: <path> against <non-spec:/..//p>" ,
"Parsing: <http://1.2.3.4.5> against <http://other.com/>" ,
"Parsing: <http://1.2.3.4.5.> against <http://other.com/>" ,
"Parsing: <http://0..0x300/> against <about:blank>" ,
"Parsing: <http://0..0x300./> against <about:blank>" ,
"Parsing: <http://256.256.256.256.256> against <http://other.com/>" ,
"Parsing: <http://256.256.256.256.256.> against <http://other.com/>" ,
"Parsing: <http://1.2.3.08> against <about:blank>" ,
"Parsing: <http://1.2.3.08.> against <about:blank>" ,
"Parsing: <http://1.2.3.09> against <about:blank>" ,
"Parsing: <http://09.2.3.4> against <about:blank>" ,
"Parsing: <http://09.2.3.4.> against <about:blank>" ,
"Parsing: <http://01.2.3.4.5> against <about:blank>" ,
"Parsing: <http://01.2.3.4.5.> against <about:blank>" ,
"Parsing: <http://0x1.2.3.4.5> against <about:blank>" ,
"Parsing: <http://0x1.2.3.4.5.> against <about:blank>" ,
"Parsing: <http://foo.1.2.3.4> against <about:blank>" ,
"Parsing: <http://foo.1.2.3.4.> against <about:blank>" ,
"Parsing: <http://foo.2.3.4> against <about:blank>" ,
"Parsing: <http://foo.2.3.4.> against <about:blank>" ,
"Parsing: <http://foo.09> against <about:blank>" ,
"Parsing: <http://foo.09.> against <about:blank>" ,
"Parsing: <http://foo.0x4> against <about:blank>" ,
2021-08-14 07:27:09 -04:00
"Parsing: <http://foo.0x4.> against <about:blank>" ,
"Parsing: <http://0999999999999999999/> against <about:blank>" ,
"Parsing: <http://foo.0x> against <about:blank>" ,
"Parsing: <http://foo.0XFfFfFfFfFfFfFfFfFfAcE123> against <about:blank>" ,
"Parsing: <http://💩.123/> against <about:blank>"
2021-01-27 16:37:15 -05:00
] ,
2021-10-08 11:44:38 -04:00
"url-constructor.any.worker.html" : [
"Parsing: <foo://ho|st/> against <about:blank>" ,
"Parsing: <http://ho%7Cst/> against <about:blank>" ,
"Parsing: <file://%43%7C> against <about:blank>" ,
"Parsing: <file://%43|> against <about:blank>" ,
"Parsing: <file://C%7C> against <about:blank>" ,
"Parsing: <file://%43%7C/> against <about:blank>" ,
"Parsing: <https://%43%7C/> against <about:blank>" ,
"Parsing: <asdf://%43|/> against <about:blank>" ,
"Parsing: </> against <file://h/C:/a/b>" ,
"Parsing: <file:\\\\//> against <about:blank>" ,
"Parsing: <file:\\\\\\\\> against <about:blank>" ,
"Parsing: <file:\\\\\\\\?fox> against <about:blank>" ,
"Parsing: <file:\\\\\\\\#guppy> against <about:blank>" ,
"Parsing: <file://spider///> against <about:blank>" ,
"Parsing: <file:\\\\localhost//> against <about:blank>" ,
"Parsing: <file://\\/localhost//cat> against <about:blank>" ,
"Parsing: <file://localhost//a//../..//> against <about:blank>" ,
"Parsing: </////mouse> against <file:///elephant>" ,
"Parsing: <\\/localhost//pig> against <file://lion/>" ,
"Parsing: <//localhost//pig> against <file://lion/>" ,
"Parsing: </..//localhost//pig> against <file://lion/>" ,
"Parsing: <C|> against <file://host/dir/file>" ,
"Parsing: <C|> against <file://host/D:/dir1/dir2/file>" ,
"Parsing: <C|#> against <file://host/dir/file>" ,
"Parsing: <C|?> against <file://host/dir/file>" ,
"Parsing: <C|/> against <file://host/dir/file>" ,
"Parsing: <C|\n/> against <file://host/dir/file>" ,
"Parsing: <C|\\> against <file://host/dir/file>" ,
"Parsing: </c:/foo/bar> against <file://host/path>" ,
"Parsing: <file://example.net/C:/> against <about:blank>" ,
"Parsing: <file://1.2.3.4/C:/> against <about:blank>" ,
"Parsing: <file://[1::8]/C:/> against <about:blank>" ,
"Parsing: <C|/> against <file://host/>" ,
"Parsing: </C:/> against <file://host/>" ,
"Parsing: <file:C:/> against <file://host/>" ,
"Parsing: <file:/C:/> against <file://host/>" ,
"Parsing: <file://localhost//a//../..//foo> against <about:blank>" ,
"Parsing: <file://localhost////foo> against <about:blank>" ,
"Parsing: <file:////foo> against <about:blank>" ,
"Parsing: <file:////one/two> against <file:///>" ,
"Parsing: <////one/two> against <file:///>" ,
"Parsing: <file:///.//> against <file:////>" ,
"Parsing: <file:.//p> against <about:blank>" ,
"Parsing: <file:/.//p> against <about:blank>" ,
"Parsing: <non-spec:/.//> against <about:blank>" ,
"Parsing: <non-spec:/..//> against <about:blank>" ,
"Parsing: <non-spec:/a/..//> against <about:blank>" ,
"Parsing: <non-spec:/.//path> against <about:blank>" ,
"Parsing: <non-spec:/..//path> against <about:blank>" ,
"Parsing: <non-spec:/a/..//path> against <about:blank>" ,
"Parsing: </.//path> against <non-spec:/p>" ,
"Parsing: </..//path> against <non-spec:/p>" ,
"Parsing: <..//path> against <non-spec:/p>" ,
"Parsing: <a/..//path> against <non-spec:/p>" ,
"Parsing: <> against <non-spec:/..//p>" ,
"Parsing: <path> against <non-spec:/..//p>" ,
"Parsing: <http://1.2.3.4.5> against <http://other.com/>" ,
"Parsing: <http://1.2.3.4.5.> against <http://other.com/>" ,
"Parsing: <http://0..0x300/> against <about:blank>" ,
"Parsing: <http://0..0x300./> against <about:blank>" ,
"Parsing: <http://256.256.256.256.256> against <http://other.com/>" ,
"Parsing: <http://256.256.256.256.256.> against <http://other.com/>" ,
"Parsing: <http://1.2.3.08> against <about:blank>" ,
"Parsing: <http://1.2.3.08.> against <about:blank>" ,
"Parsing: <http://1.2.3.09> against <about:blank>" ,
"Parsing: <http://09.2.3.4> against <about:blank>" ,
"Parsing: <http://09.2.3.4.> against <about:blank>" ,
"Parsing: <http://01.2.3.4.5> against <about:blank>" ,
"Parsing: <http://01.2.3.4.5.> against <about:blank>" ,
"Parsing: <http://0x1.2.3.4.5> against <about:blank>" ,
"Parsing: <http://0x1.2.3.4.5.> against <about:blank>" ,
"Parsing: <http://foo.1.2.3.4> against <about:blank>" ,
"Parsing: <http://foo.1.2.3.4.> against <about:blank>" ,
"Parsing: <http://foo.2.3.4> against <about:blank>" ,
"Parsing: <http://foo.2.3.4.> against <about:blank>" ,
"Parsing: <http://foo.09> against <about:blank>" ,
"Parsing: <http://foo.09.> against <about:blank>" ,
"Parsing: <http://foo.0x4> against <about:blank>" ,
"Parsing: <http://foo.0x4.> against <about:blank>" ,
"Parsing: <http://0999999999999999999/> against <about:blank>" ,
"Parsing: <http://foo.0x> against <about:blank>" ,
"Parsing: <http://foo.0XFfFfFfFfFfFfFfFfFfAcE123> against <about:blank>" ,
"Parsing: <http://💩.123/> against <about:blank>"
] ,
"url-origin.any.html" : true ,
"url-origin.any.worker.html" : true ,
"url-searchparams.any.html" : true ,
"url-searchparams.any.worker.html" : true ,
"url-setters-stripping.any.html" : [
"Setting protocol with leading U+0000 (https:)" ,
"Setting protocol with U+0000 before inserted colon (https:)" ,
"Setting port with leading U+0000 (https:)" ,
"Setting pathname with trailing U+0000 (https:)" ,
"Setting protocol with leading U+001F (https:)" ,
"Setting protocol with U+001F before inserted colon (https:)" ,
"Setting port with leading U+001F (https:)" ,
"Setting pathname with trailing U+001F (https:)" ,
"Setting protocol with leading U+0000 (wpt++:)" ,
"Setting protocol with U+0000 before inserted colon (wpt++:)" ,
"Setting port with leading U+0000 (wpt++:)" ,
"Setting pathname with trailing U+0000 (wpt++:)" ,
"Setting protocol with leading U+001F (wpt++:)" ,
"Setting protocol with U+001F before inserted colon (wpt++:)" ,
"Setting port with leading U+001F (wpt++:)" ,
"Setting pathname with trailing U+001F (wpt++:)"
] ,
"url-setters-stripping.any.worker.html" : [
2021-01-27 16:37:15 -05:00
"Setting protocol with leading U+0000 (https:)" ,
"Setting protocol with U+0000 before inserted colon (https:)" ,
2021-03-01 20:30:24 -05:00
"Setting port with leading U+0000 (https:)" ,
"Setting pathname with trailing U+0000 (https:)" ,
2021-01-27 16:37:15 -05:00
"Setting protocol with leading U+001F (https:)" ,
"Setting protocol with U+001F before inserted colon (https:)" ,
2021-03-01 20:30:24 -05:00
"Setting port with leading U+001F (https:)" ,
"Setting pathname with trailing U+001F (https:)" ,
2021-01-27 16:37:15 -05:00
"Setting protocol with leading U+0000 (wpt++:)" ,
"Setting protocol with U+0000 before inserted colon (wpt++:)" ,
2021-03-01 20:30:24 -05:00
"Setting port with leading U+0000 (wpt++:)" ,
2021-01-27 16:37:15 -05:00
"Setting pathname with trailing U+0000 (wpt++:)" ,
"Setting protocol with leading U+001F (wpt++:)" ,
"Setting protocol with U+001F before inserted colon (wpt++:)" ,
2021-03-01 20:30:24 -05:00
"Setting port with leading U+001F (wpt++:)" ,
2021-01-27 16:37:15 -05:00
"Setting pathname with trailing U+001F (wpt++:)"
] ,
2021-05-09 10:32:30 -04:00
"url-tojson.any.html" : true ,
2021-10-08 11:44:38 -04:00
"url-tojson.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"urlencoded-parser.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlencoded-parser.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"urlsearchparams-append.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-append.any.worker.html" : true ,
2021-06-24 05:38:37 -04:00
"urlsearchparams-constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"urlsearchparams-delete.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-delete.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"urlsearchparams-foreach.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-foreach.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"urlsearchparams-get.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-get.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"urlsearchparams-getall.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-getall.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"urlsearchparams-has.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-has.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"urlsearchparams-set.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-set.any.worker.html" : true ,
2021-05-19 14:45:48 -04:00
"urlsearchparams-sort.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-sort.any.worker.html" : true ,
2021-06-05 13:29:41 -04:00
"urlsearchparams-stringifier.any.html" : true ,
2021-10-08 11:44:38 -04:00
"urlsearchparams-stringifier.any.worker.html" : true ,
2021-06-05 13:29:41 -04:00
"url-setters.any.html" : [
"URL: Setting <http://example.net/path>.hostname = 'example.com:8080' : delimiter invalidates entire value" ,
"URL: Setting <http://example.net:8080/path>.hostname = 'example.com:' : delimiter invalidates entire value" ,
"URL: Setting <non-spec:/.//p>.hostname = 'h' Drop /. from path" ,
"URL: Setting <non-spec:/.//p>.hostname = ''" ,
2021-07-03 15:34:48 -04:00
"URL: Setting <foo://somehost/some/path>.pathname = '' Non-special URLs can have their paths erased" ,
"URL: Setting <foo:///some/path>.pathname = '' Non-special URLs with an empty host can have their paths erased" ,
2021-06-05 13:29:41 -04:00
"URL: Setting <file://monkey/>.pathname = '\\\\' File URLs and (back)slashes" ,
"URL: Setting <file:///unicorn>.pathname = '//\\/' File URLs and (back)slashes" ,
"URL: Setting <file:///unicorn>.pathname = '//monkey/..//' File URLs and (back)slashes" ,
"URL: Setting <non-spec:/>.pathname = '/.//p' Serialize /. in path" ,
"URL: Setting <non-spec:/>.pathname = '/..//p'" ,
"URL: Setting <non-spec:/>.pathname = '//p'" ,
"URL: Setting <non-spec:/.//>.pathname = 'p' Drop /. from path"
2021-10-08 11:44:38 -04:00
] ,
"url-setters.any.worker.html" : [
"URL: Setting <http://example.net/path>.hostname = 'example.com:8080' : delimiter invalidates entire value" ,
"URL: Setting <http://example.net:8080/path>.hostname = 'example.com:' : delimiter invalidates entire value" ,
"URL: Setting <non-spec:/.//p>.hostname = 'h' Drop /. from path" ,
"URL: Setting <non-spec:/.//p>.hostname = ''" ,
"URL: Setting <foo://somehost/some/path>.pathname = '' Non-special URLs can have their paths erased" ,
"URL: Setting <foo:///some/path>.pathname = '' Non-special URLs with an empty host can have their paths erased" ,
"URL: Setting <file://monkey/>.pathname = '\\\\' File URLs and (back)slashes" ,
"URL: Setting <file:///unicorn>.pathname = '//\\/' File URLs and (back)slashes" ,
"URL: Setting <file:///unicorn>.pathname = '//monkey/..//' File URLs and (back)slashes" ,
"URL: Setting <non-spec:/>.pathname = '/.//p' Serialize /. in path" ,
"URL: Setting <non-spec:/>.pathname = '/..//p'" ,
"URL: Setting <non-spec:/>.pathname = '//p'" ,
"URL: Setting <non-spec:/.//>.pathname = 'p' Drop /. from path"
2021-06-05 13:29:41 -04:00
]
2021-01-28 15:37:21 -05:00
} ,
"fetch" : {
"api" : {
"request" : {
2021-05-09 10:32:30 -04:00
"request-init-002.any.html" : true ,
2021-10-08 11:44:38 -04:00
"request-init-002.any.worker.html" : true ,
2021-06-23 10:00:23 -04:00
"request-init-stream.any.html" : true ,
2021-10-08 11:44:38 -04:00
"request-init-stream.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"request-consume-empty.any.html" : [
2021-04-20 08:47:22 -04:00
"Consume empty FormData request body as text"
] ,
2021-10-08 11:44:38 -04:00
"request-consume-empty.any.worker.html" : [
"Consume empty FormData request body as text"
] ,
2021-08-09 12:49:31 -04:00
"request-consume.any.html" : true ,
2021-10-08 11:44:38 -04:00
"request-consume.any.worker.html" : true ,
2021-08-09 12:49:31 -04:00
"request-disturbed.any.html" : [
"Request construction failure should not set \"bodyUsed\"" ,
"Input request used for creating new request became disturbed" ,
"Input request used for creating new request became disturbed even if body is not used"
] ,
2021-10-08 11:44:38 -04:00
"request-disturbed.any.worker.html" : [
"Request construction failure should not set \"bodyUsed\"" ,
"Input request used for creating new request became disturbed" ,
"Input request used for creating new request became disturbed even if body is not used"
] ,
2021-08-09 12:49:31 -04:00
"request-error.any.html" : [
"RequestInit's window is not null" ,
"Input URL has credentials" ,
"RequestInit's mode is navigate" ,
"RequestInit's referrer is invalid" ,
"RequestInit's mode is no-cors and method is not simple" ,
"RequestInit's cache mode is only-if-cached and mode is not same-origin" ,
"Request with cache mode: only-if-cached and fetch mode cors" ,
"Request with cache mode: only-if-cached and fetch mode no-cors" ,
"Bad referrerPolicy init parameter value" ,
"Bad mode init parameter value" ,
"Bad credentials init parameter value" ,
"Bad cache init parameter value"
] ,
2021-10-08 11:44:38 -04:00
"request-error.any.worker.html" : [
"RequestInit's window is not null" ,
"Input URL has credentials" ,
"RequestInit's mode is navigate" ,
"RequestInit's referrer is invalid" ,
"RequestInit's mode is no-cors and method is not simple" ,
"RequestInit's cache mode is only-if-cached and mode is not same-origin" ,
"Request with cache mode: only-if-cached and fetch mode cors" ,
"Request with cache mode: only-if-cached and fetch mode no-cors" ,
"Bad referrerPolicy init parameter value" ,
"Bad mode init parameter value" ,
"Bad credentials init parameter value" ,
"Bad cache init parameter value"
] ,
2021-08-09 12:49:31 -04:00
"request-headers.any.html" : [
"Adding invalid request header \"Accept-Charset: KO\"" ,
"Adding invalid request header \"accept-charset: KO\"" ,
"Adding invalid request header \"ACCEPT-ENCODING: KO\"" ,
"Adding invalid request header \"Accept-Encoding: KO\"" ,
"Adding invalid request header \"Access-Control-Request-Headers: KO\"" ,
"Adding invalid request header \"Access-Control-Request-Method: KO\"" ,
"Adding invalid request header \"Connection: KO\"" ,
"Adding invalid request header \"Content-Length: KO\"" ,
"Adding invalid request header \"Cookie: KO\"" ,
"Adding invalid request header \"Cookie2: KO\"" ,
"Adding invalid request header \"Date: KO\"" ,
"Adding invalid request header \"DNT: KO\"" ,
"Adding invalid request header \"Expect: KO\"" ,
"Adding invalid request header \"Host: KO\"" ,
"Adding invalid request header \"Keep-Alive: KO\"" ,
"Adding invalid request header \"Origin: KO\"" ,
"Adding invalid request header \"Referer: KO\"" ,
"Adding invalid request header \"TE: KO\"" ,
"Adding invalid request header \"Trailer: KO\"" ,
"Adding invalid request header \"Transfer-Encoding: KO\"" ,
"Adding invalid request header \"Upgrade: KO\"" ,
"Adding invalid request header \"Via: KO\"" ,
"Adding invalid request header \"Proxy-: KO\"" ,
"Adding invalid request header \"proxy-a: KO\"" ,
"Adding invalid request header \"Sec-: KO\"" ,
"Adding invalid request header \"sec-b: KO\"" ,
"Adding invalid no-cors request header \"Content-Type: KO\"" ,
"Adding invalid no-cors request header \"Potato: KO\"" ,
"Adding invalid no-cors request header \"proxy: KO\"" ,
"Adding invalid no-cors request header \"proxya: KO\"" ,
"Adding invalid no-cors request header \"sec: KO\"" ,
"Adding invalid no-cors request header \"secb: KO\"" ,
"Check that request constructor is filtering headers provided as init parameter" ,
"Check that no-cors request constructor is filtering headers provided as init parameter" ,
"Check that no-cors request constructor is filtering headers provided as part of request parameter"
] ,
2021-10-08 11:44:38 -04:00
"request-headers.any.worker.html" : [
"Adding invalid request header \"Accept-Charset: KO\"" ,
"Adding invalid request header \"accept-charset: KO\"" ,
"Adding invalid request header \"ACCEPT-ENCODING: KO\"" ,
"Adding invalid request header \"Accept-Encoding: KO\"" ,
"Adding invalid request header \"Access-Control-Request-Headers: KO\"" ,
"Adding invalid request header \"Access-Control-Request-Method: KO\"" ,
"Adding invalid request header \"Connection: KO\"" ,
"Adding invalid request header \"Content-Length: KO\"" ,
"Adding invalid request header \"Cookie: KO\"" ,
"Adding invalid request header \"Cookie2: KO\"" ,
"Adding invalid request header \"Date: KO\"" ,
"Adding invalid request header \"DNT: KO\"" ,
"Adding invalid request header \"Expect: KO\"" ,
"Adding invalid request header \"Host: KO\"" ,
"Adding invalid request header \"Keep-Alive: KO\"" ,
"Adding invalid request header \"Origin: KO\"" ,
"Adding invalid request header \"Referer: KO\"" ,
"Adding invalid request header \"TE: KO\"" ,
"Adding invalid request header \"Trailer: KO\"" ,
"Adding invalid request header \"Transfer-Encoding: KO\"" ,
"Adding invalid request header \"Upgrade: KO\"" ,
"Adding invalid request header \"Via: KO\"" ,
"Adding invalid request header \"Proxy-: KO\"" ,
"Adding invalid request header \"proxy-a: KO\"" ,
"Adding invalid request header \"Sec-: KO\"" ,
"Adding invalid request header \"sec-b: KO\"" ,
"Adding invalid no-cors request header \"Content-Type: KO\"" ,
"Adding invalid no-cors request header \"Potato: KO\"" ,
"Adding invalid no-cors request header \"proxy: KO\"" ,
"Adding invalid no-cors request header \"proxya: KO\"" ,
"Adding invalid no-cors request header \"sec: KO\"" ,
"Adding invalid no-cors request header \"secb: KO\"" ,
"Check that request constructor is filtering headers provided as init parameter" ,
"Check that no-cors request constructor is filtering headers provided as init parameter" ,
"Check that no-cors request constructor is filtering headers provided as part of request parameter"
] ,
2021-08-09 12:49:31 -04:00
"request-init-contenttype.any.html" : true ,
2021-10-08 11:44:38 -04:00
"request-init-contenttype.any.worker.html" : true ,
2021-08-09 12:49:31 -04:00
"request-structure.any.html" : [
"Check destination attribute" ,
"Check referrer attribute" ,
"Check referrerPolicy attribute" ,
"Check mode attribute" ,
"Check credentials attribute" ,
"Check cache attribute" ,
"Check integrity attribute" ,
"Check isReloadNavigation attribute" ,
"Check isHistoryNavigation attribute"
2021-10-08 11:44:38 -04:00
] ,
"request-structure.any.worker.html" : [
"Check destination attribute" ,
"Check referrer attribute" ,
"Check referrerPolicy attribute" ,
"Check mode attribute" ,
"Check credentials attribute" ,
"Check cache attribute" ,
"Check integrity attribute" ,
"Check isReloadNavigation attribute" ,
"Check isHistoryNavigation attribute"
2021-08-09 12:49:31 -04:00
]
2021-04-18 19:00:13 -04:00
} ,
"headers" : {
2021-09-29 12:42:06 -04:00
"header-values-normalize.any.html" : [
"XMLHttpRequest with value %00" ,
"XMLHttpRequest with value %01" ,
"XMLHttpRequest with value %02" ,
"XMLHttpRequest with value %03" ,
"XMLHttpRequest with value %04" ,
"XMLHttpRequest with value %05" ,
"XMLHttpRequest with value %06" ,
"XMLHttpRequest with value %07" ,
"XMLHttpRequest with value %08" ,
"XMLHttpRequest with value %09" ,
"XMLHttpRequest with value %0A" ,
"XMLHttpRequest with value %0D" ,
"XMLHttpRequest with value %0E" ,
"XMLHttpRequest with value %0F" ,
"XMLHttpRequest with value %10" ,
"XMLHttpRequest with value %11" ,
"XMLHttpRequest with value %12" ,
"XMLHttpRequest with value %13" ,
"XMLHttpRequest with value %14" ,
"XMLHttpRequest with value %15" ,
"XMLHttpRequest with value %16" ,
"XMLHttpRequest with value %17" ,
"XMLHttpRequest with value %18" ,
"XMLHttpRequest with value %19" ,
"XMLHttpRequest with value %1A" ,
"XMLHttpRequest with value %1B" ,
"XMLHttpRequest with value %1C" ,
"XMLHttpRequest with value %1D" ,
"XMLHttpRequest with value %1E" ,
"XMLHttpRequest with value %1F" ,
"XMLHttpRequest with value %20" ,
"fetch() with value %01" ,
"fetch() with value %02" ,
"fetch() with value %03" ,
"fetch() with value %04" ,
"fetch() with value %05" ,
"fetch() with value %06" ,
"fetch() with value %07" ,
"fetch() with value %08" ,
"fetch() with value %0E" ,
"fetch() with value %0F" ,
"fetch() with value %10" ,
"fetch() with value %11" ,
"fetch() with value %12" ,
"fetch() with value %13" ,
"fetch() with value %14" ,
"fetch() with value %15" ,
"fetch() with value %16" ,
"fetch() with value %17" ,
"fetch() with value %18" ,
"fetch() with value %19" ,
"fetch() with value %1A" ,
"fetch() with value %1B" ,
"fetch() with value %1C" ,
"fetch() with value %1D" ,
"fetch() with value %1E" ,
"fetch() with value %1F"
] ,
"header-values-normalize.any.worker.html" : [
"fetch() with value %01" ,
"fetch() with value %02" ,
"fetch() with value %03" ,
"fetch() with value %04" ,
"fetch() with value %05" ,
"fetch() with value %06" ,
"fetch() with value %07" ,
"fetch() with value %08" ,
"fetch() with value %0E" ,
"fetch() with value %0F" ,
"fetch() with value %10" ,
"fetch() with value %11" ,
"fetch() with value %12" ,
"fetch() with value %13" ,
"fetch() with value %14" ,
"fetch() with value %15" ,
"fetch() with value %16" ,
"fetch() with value %17" ,
"fetch() with value %18" ,
"fetch() with value %19" ,
"fetch() with value %1A" ,
"fetch() with value %1B" ,
"fetch() with value %1C" ,
"fetch() with value %1D" ,
"fetch() with value %1E" ,
"fetch() with value %1F"
] ,
"header-values.any.html" : [
"XMLHttpRequest with value x%00x needs to throw" ,
"XMLHttpRequest with value x%0Ax needs to throw" ,
"XMLHttpRequest with value x%0Dx needs to throw" ,
"XMLHttpRequest with all valid values" ,
"fetch() with all valid values"
] ,
"header-values.any.worker.html" : [
"fetch() with all valid values"
] ,
2021-05-09 10:32:30 -04:00
"headers-basic.any.html" : true ,
"headers-casing.any.html" : true ,
"headers-combine.any.html" : true ,
"headers-errors.any.html" : true ,
"headers-normalize.any.html" : true ,
"headers-record.any.html" : true ,
2021-09-29 12:42:06 -04:00
"headers-structure.any.html" : true ,
2021-10-11 12:50:18 -04:00
"headers-basic.any.worker.html" : true ,
2021-09-29 12:42:06 -04:00
"headers-casing.any.worker.html" : true ,
"headers-combine.any.worker.html" : true ,
"headers-errors.any.worker.html" : true ,
"headers-no-cors.any.html" : [
"\"no-cors\" Headers object cannot have accept set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have accept-language set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have content-language set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have accept set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have accept-language set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have content-language set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have content-type set to text/plain;ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, text/plain" ,
"\"no-cors\" Headers object cannot have accept/\" as header" ,
"\"no-cors\" Headers object cannot have accept/012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678 as header" ,
"\"no-cors\" Headers object cannot have accept-language/\u0001 as header" ,
"\"no-cors\" Headers object cannot have accept-language/@ as header" ,
"\"no-cors\" Headers object cannot have authorization/basics as header" ,
"\"no-cors\" Headers object cannot have content-language/\u0001 as header" ,
"\"no-cors\" Headers object cannot have content-language/@ as header" ,
"\"no-cors\" Headers object cannot have content-type/text/html as header" ,
"\"no-cors\" Headers object cannot have content-type/text/plain; long=0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901 as header" ,
"\"no-cors\" Headers object cannot have range/bytes 0- as header" ,
"\"no-cors\" Headers object cannot have test/hi as header" ,
"\"no-cors\" Headers object cannot have dpr/2 as header" ,
"\"no-cors\" Headers object cannot have downlink/1 as header" ,
"\"no-cors\" Headers object cannot have save-data/on as header" ,
"\"no-cors\" Headers object cannot have viewport-width/100 as header" ,
"\"no-cors\" Headers object cannot have width/100 as header" ,
"\"no-cors\" Headers object cannot have unknown/doesitmatter as header"
] ,
"headers-no-cors.any.worker.html" : [
"\"no-cors\" Headers object cannot have accept set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have accept-language set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have content-language set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have accept set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have accept-language set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have content-language set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss" ,
"\"no-cors\" Headers object cannot have content-type set to text/plain;ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, text/plain" ,
"\"no-cors\" Headers object cannot have accept/\" as header" ,
"\"no-cors\" Headers object cannot have accept/012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678 as header" ,
"\"no-cors\" Headers object cannot have accept-language/\u0001 as header" ,
"\"no-cors\" Headers object cannot have accept-language/@ as header" ,
"\"no-cors\" Headers object cannot have authorization/basics as header" ,
"\"no-cors\" Headers object cannot have content-language/\u0001 as header" ,
"\"no-cors\" Headers object cannot have content-language/@ as header" ,
"\"no-cors\" Headers object cannot have content-type/text/html as header" ,
"\"no-cors\" Headers object cannot have content-type/text/plain; long=0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901 as header" ,
"\"no-cors\" Headers object cannot have range/bytes 0- as header" ,
"\"no-cors\" Headers object cannot have test/hi as header" ,
"\"no-cors\" Headers object cannot have dpr/2 as header" ,
"\"no-cors\" Headers object cannot have downlink/1 as header" ,
"\"no-cors\" Headers object cannot have save-data/on as header" ,
"\"no-cors\" Headers object cannot have viewport-width/100 as header" ,
"\"no-cors\" Headers object cannot have width/100 as header" ,
"\"no-cors\" Headers object cannot have unknown/doesitmatter as header"
] ,
"headers-normalize.any.worker.html" : true ,
"headers-record.any.worker.html" : true ,
"headers-structure.any.worker.html" : true
2021-04-20 08:47:22 -04:00
} ,
"basic" : {
2021-05-09 10:32:30 -04:00
"request-head.any.html" : true ,
2021-10-08 11:44:38 -04:00
"request-head.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"request-headers-case.any.html" : false ,
2021-10-08 11:44:38 -04:00
"request-headers-case.any.worker.html" : false ,
2021-06-26 11:34:24 -04:00
"request-headers-nonascii.any.html" : true ,
2021-10-08 11:44:38 -04:00
"request-headers-nonascii.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"request-headers.any.html" : [
2021-04-20 08:47:22 -04:00
"Fetch with PUT without body" ,
2021-08-02 09:56:52 -04:00
"Fetch with PUT with body" ,
"Fetch with POST without body" ,
"Fetch with POST with text body" ,
"Fetch with POST with FormData body" ,
"Fetch with POST with URLSearchParams body" ,
"Fetch with POST with Blob body" ,
"Fetch with POST with ArrayBuffer body" ,
"Fetch with POST with Uint8Array body" ,
"Fetch with POST with Int8Array body" ,
"Fetch with POST with Float32Array body" ,
"Fetch with POST with Float64Array body" ,
"Fetch with POST with DataView body" ,
"Fetch with POST with Blob body with mime type" ,
"Fetch with Chicken" ,
"Fetch with Chicken with body" ,
"Fetch with POST and mode \"same-origin\" needs an Origin header" ,
"Fetch with POST and mode \"no-cors\" needs an Origin header" ,
"Fetch with PUT and mode \"same-origin\" needs an Origin header" ,
"Fetch with TacO and mode \"same-origin\" needs an Origin header" ,
"Fetch with TacO and mode \"cors\" needs an Origin header"
2021-04-20 08:47:22 -04:00
] ,
2021-10-08 11:44:38 -04:00
"request-headers.any.worker.html" : [
"Fetch with PUT without body" ,
"Fetch with PUT with body" ,
"Fetch with POST without body" ,
"Fetch with POST with text body" ,
"Fetch with POST with FormData body" ,
"Fetch with POST with URLSearchParams body" ,
"Fetch with POST with Blob body" ,
"Fetch with POST with ArrayBuffer body" ,
"Fetch with POST with Uint8Array body" ,
"Fetch with POST with Int8Array body" ,
"Fetch with POST with Float32Array body" ,
"Fetch with POST with Float64Array body" ,
"Fetch with POST with DataView body" ,
"Fetch with POST with Blob body with mime type" ,
"Fetch with Chicken" ,
"Fetch with Chicken with body" ,
"Fetch with POST and mode \"same-origin\" needs an Origin header" ,
"Fetch with POST and mode \"no-cors\" needs an Origin header" ,
"Fetch with PUT and mode \"same-origin\" needs an Origin header" ,
"Fetch with TacO and mode \"same-origin\" needs an Origin header" ,
"Fetch with TacO and mode \"cors\" needs an Origin header"
] ,
2021-05-09 10:32:30 -04:00
"text-utf8.any.html" : true ,
2021-10-08 11:44:38 -04:00
"text-utf8.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"accept-header.any.html" : [
2021-04-20 08:47:22 -04:00
"Request through fetch should have a 'accept-language' header"
] ,
2021-10-08 11:44:38 -04:00
"accept-header.any.worker.html" : [
"Request through fetch should have a 'accept-language' header"
] ,
2021-05-09 10:32:30 -04:00
"conditional-get.any.html" : false ,
2021-10-08 11:44:38 -04:00
"conditional-get.any.worker.html" : false ,
2021-05-09 10:32:30 -04:00
"error-after-response.any.html" : false ,
"header-value-combining.any.html" : false ,
2021-10-08 11:44:38 -04:00
"header-value-combining.any.worker.html" : false ,
2021-05-09 10:32:30 -04:00
"header-value-null-byte.any.html" : true ,
2021-10-08 11:44:38 -04:00
"header-value-null-byte.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"historical.any.html" : true ,
2021-10-08 11:44:38 -04:00
"historical.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"http-response-code.any.html" : true ,
2021-10-08 11:44:38 -04:00
"http-response-code.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"request-upload.any.html" : [
2021-04-20 08:47:22 -04:00
"Fetch with POST with ReadableStream containing String" ,
"Fetch with POST with ReadableStream containing null" ,
"Fetch with POST with ReadableStream containing number" ,
"Fetch with POST with ReadableStream containing ArrayBuffer" ,
"Fetch with POST with ReadableStream containing Blob" ,
"Fetch with POST with text body on 421 response should be retried once on new connection."
] ,
2021-10-08 11:44:38 -04:00
"request-upload.any.worker.html" : [
"Fetch with POST with ReadableStream containing String" ,
"Fetch with POST with ReadableStream containing null" ,
"Fetch with POST with ReadableStream containing number" ,
"Fetch with POST with ReadableStream containing ArrayBuffer" ,
"Fetch with POST with ReadableStream containing Blob" ,
"Fetch with POST with text body on 421 response should be retried once on new connection."
] ,
2021-05-09 10:32:30 -04:00
"response-url.sub.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-url.sub.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"scheme-about.any.html" : true ,
2021-10-08 11:44:38 -04:00
"scheme-about.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"scheme-blob.sub.any.html" : true ,
2021-10-08 11:44:38 -04:00
"scheme-blob.sub.any.worker.html" : true ,
2021-06-18 05:14:14 -04:00
"scheme-data.any.html" : true ,
2021-10-08 11:44:38 -04:00
"scheme-data.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"scheme-others.sub.any.html" : true ,
2021-10-08 11:44:38 -04:00
"scheme-others.sub.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"stream-response.any.html" : true ,
2021-10-08 11:44:38 -04:00
"stream-response.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"stream-safe-creation.any.html" : [
"throwing Object.prototype.start accessor should not affect stream creation by 'fetch'" ,
"Object.prototype.start accessor returning invalid value should not affect stream creation by 'fetch'" ,
2021-06-15 07:46:02 -04:00
"throwing Object.prototype.type accessor should not affect stream creation by 'fetch'" ,
2021-05-09 10:32:30 -04:00
"throwing Object.prototype.size accessor should not affect stream creation by 'fetch'" ,
"Object.prototype.size accessor returning invalid value should not affect stream creation by 'fetch'" ,
"throwing Object.prototype.highWaterMark accessor should not affect stream creation by 'fetch'" ,
"Object.prototype.highWaterMark accessor returning invalid value should not affect stream creation by 'fetch'"
2021-08-09 12:49:31 -04:00
] ,
2021-10-08 11:44:38 -04:00
"stream-safe-creation.any.worker.html" : [
"throwing Object.prototype.start accessor should not affect stream creation by 'fetch'" ,
"Object.prototype.start accessor returning invalid value should not affect stream creation by 'fetch'" ,
"throwing Object.prototype.type accessor should not affect stream creation by 'fetch'" ,
"throwing Object.prototype.size accessor should not affect stream creation by 'fetch'" ,
"Object.prototype.size accessor returning invalid value should not affect stream creation by 'fetch'" ,
"throwing Object.prototype.highWaterMark accessor should not affect stream creation by 'fetch'" ,
"Object.prototype.highWaterMark accessor returning invalid value should not affect stream creation by 'fetch'"
] ,
2021-08-09 12:49:31 -04:00
"integrity.sub.any.html" : [
"Invalid integrity" ,
"Multiple integrities: invalid stronger than valid" ,
"Multiple integrities: both are invalid" ,
"CORS invalid integrity" ,
"Empty string integrity for opaque response" ,
"SHA-* integrity for opaque response"
] ,
2021-10-08 11:44:38 -04:00
"integrity.sub.any.worker.html" : [
"Invalid integrity" ,
"Multiple integrities: invalid stronger than valid" ,
"Multiple integrities: both are invalid" ,
"CORS invalid integrity" ,
"Empty string integrity for opaque response" ,
"SHA-* integrity for opaque response"
2021-10-10 15:46:15 -04:00
]
2021-04-20 08:47:22 -04:00
} ,
"response" : {
2021-05-09 10:32:30 -04:00
"json.any.html" : true ,
2021-10-08 11:44:38 -04:00
"json.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-init-001.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-init-001.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-init-002.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-init-002.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-static-error.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-static-error.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-static-redirect.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-static-redirect.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-stream-disturbed-1.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-stream-disturbed-1.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-stream-disturbed-2.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-stream-disturbed-2.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-stream-disturbed-3.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-stream-disturbed-3.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-stream-disturbed-4.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-stream-disturbed-4.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-stream-disturbed-5.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-stream-disturbed-5.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-stream-disturbed-6.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-stream-disturbed-6.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-stream-disturbed-by-pipe.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-stream-disturbed-by-pipe.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-stream-with-broken-then.any.html" : [
2021-04-20 08:47:22 -04:00
"Attempt to inject {done: false, value: bye} via Object.prototype.then." ,
"Attempt to inject value: undefined via Object.prototype.then." ,
"Attempt to inject undefined via Object.prototype.then." ,
"Attempt to inject 8.2 via Object.prototype.then." ,
"intercepting arraybuffer to text conversion via Object.prototype.then should not be possible"
] ,
2021-10-08 11:44:38 -04:00
"response-stream-with-broken-then.any.worker.html" : [
"Attempt to inject {done: false, value: bye} via Object.prototype.then." ,
"Attempt to inject value: undefined via Object.prototype.then." ,
"Attempt to inject undefined via Object.prototype.then." ,
"Attempt to inject 8.2 via Object.prototype.then." ,
"intercepting arraybuffer to text conversion via Object.prototype.then should not be possible"
] ,
2021-05-09 10:32:30 -04:00
"response-error-from-stream.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-error-from-stream.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-error.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-error.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-from-stream.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-from-stream.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-cancel-stream.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-cancel-stream.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"response-clone.any.html" : [
2021-04-20 08:47:22 -04:00
"Check response clone use structureClone for teed ReadableStreams (Int8Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Int16Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Int32Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (ArrayBufferchunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Uint8Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Uint8ClampedArraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Uint16Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Uint32Arraychunk)" ,
2021-07-03 15:34:48 -04:00
"Check response clone use structureClone for teed ReadableStreams (BigInt64Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (BigUint64Arraychunk)" ,
2021-04-20 08:47:22 -04:00
"Check response clone use structureClone for teed ReadableStreams (Float32Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Float64Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (DataViewchunk)"
] ,
2021-10-08 11:44:38 -04:00
"response-clone.any.worker.html" : [
"Check response clone use structureClone for teed ReadableStreams (Int8Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Int16Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Int32Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (ArrayBufferchunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Uint8Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Uint8ClampedArraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Uint16Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Uint32Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (BigInt64Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (BigUint64Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Float32Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (Float64Arraychunk)" ,
"Check response clone use structureClone for teed ReadableStreams (DataViewchunk)"
] ,
2021-05-09 10:32:30 -04:00
"response-consume-empty.any.html" : [
2021-04-20 08:47:22 -04:00
"Consume empty FormData response body as text"
] ,
2021-10-08 11:44:38 -04:00
"response-consume-empty.any.worker.html" : [
"Consume empty FormData response body as text"
] ,
2021-08-09 12:49:31 -04:00
"response-consume-stream.any.html" : true ,
2021-10-08 11:44:38 -04:00
"response-consume-stream.any.worker.html" : true ,
"response-init-contenttype.any.html" : true ,
"response-init-contenttype.any.worker.html" : true
2021-04-20 08:47:22 -04:00
} ,
"body" : {
2021-09-25 09:27:34 -04:00
"formdata.any.html" : [
"Consume empty response.formData() as FormData" ,
"Consume empty request.formData() as FormData"
] ,
"formdata.any.worker.html" : [
"Consume empty response.formData() as FormData" ,
"Consume empty request.formData() as FormData"
] ,
2021-10-08 11:44:38 -04:00
"mime-type.any.html" : true ,
"mime-type.any.worker.html" : true
2021-04-20 08:47:22 -04:00
} ,
"redirect" : {
2021-05-09 10:32:30 -04:00
"redirect-count.any.html" : true ,
2021-10-08 11:44:38 -04:00
"redirect-count.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"redirect-empty-location.any.html" : [
2021-04-20 08:47:22 -04:00
"redirect response with empty Location, manual mode"
] ,
2021-10-08 11:44:38 -04:00
"redirect-empty-location.any.worker.html" : [
"redirect response with empty Location, manual mode"
] ,
2021-09-25 09:27:34 -04:00
"redirect-location-escape.tentative.any.html" : [
"Redirect to unescaped UTF-8" ,
"Redirect to escaped and unescaped UTF-8" ,
"Escaping produces double-percent" ,
"Redirect to invalid UTF-8"
] ,
"redirect-location-escape.tentative.any.worker.html" : [
"Redirect to unescaped UTF-8" ,
"Redirect to escaped and unescaped UTF-8" ,
"Escaping produces double-percent" ,
"Redirect to invalid UTF-8"
] ,
2021-05-09 10:32:30 -04:00
"redirect-location.any.html" : [
2021-04-20 08:47:22 -04:00
"Redirect 301 in \"manual\" mode without location" ,
"Redirect 301 in \"manual\" mode with invalid location" ,
"Redirect 301 in \"manual\" mode with data location" ,
"Redirect 302 in \"manual\" mode without location" ,
"Redirect 302 in \"manual\" mode with invalid location" ,
"Redirect 302 in \"manual\" mode with data location" ,
"Redirect 303 in \"manual\" mode without location" ,
"Redirect 303 in \"manual\" mode with invalid location" ,
"Redirect 303 in \"manual\" mode with data location" ,
"Redirect 307 in \"manual\" mode without location" ,
"Redirect 307 in \"manual\" mode with invalid location" ,
"Redirect 307 in \"manual\" mode with data location" ,
"Redirect 308 in \"manual\" mode without location" ,
"Redirect 308 in \"manual\" mode with invalid location" ,
"Redirect 308 in \"manual\" mode with data location"
] ,
2021-10-08 11:44:38 -04:00
"redirect-location.any.worker.html" : [
"Redirect 301 in \"manual\" mode without location" ,
"Redirect 301 in \"manual\" mode with invalid location" ,
"Redirect 301 in \"manual\" mode with data location" ,
"Redirect 302 in \"manual\" mode without location" ,
"Redirect 302 in \"manual\" mode with invalid location" ,
"Redirect 302 in \"manual\" mode with data location" ,
"Redirect 303 in \"manual\" mode without location" ,
"Redirect 303 in \"manual\" mode with invalid location" ,
"Redirect 303 in \"manual\" mode with data location" ,
"Redirect 307 in \"manual\" mode without location" ,
"Redirect 307 in \"manual\" mode with invalid location" ,
"Redirect 307 in \"manual\" mode with data location" ,
"Redirect 308 in \"manual\" mode without location" ,
"Redirect 308 in \"manual\" mode with invalid location" ,
"Redirect 308 in \"manual\" mode with data location"
] ,
2021-05-09 10:32:30 -04:00
"redirect-method.any.html" : true ,
2021-10-08 11:44:38 -04:00
"redirect-method.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"redirect-schemes.any.html" : true ,
2021-10-08 11:44:38 -04:00
"redirect-schemes.any.worker.html" : true ,
2021-09-25 09:27:34 -04:00
"redirect-to-dataurl.any.html" : true ,
2021-10-10 15:46:15 -04:00
"redirect-to-dataurl.any.worker.html" : true
2021-04-26 07:02:49 -04:00
} ,
2021-05-09 10:32:30 -04:00
"idlharness.any.html" : [
2021-04-26 07:02:49 -04:00
"Request interface: attribute destination" ,
"Request interface: attribute referrer" ,
"Request interface: attribute referrerPolicy" ,
"Request interface: attribute mode" ,
"Request interface: attribute credentials" ,
"Request interface: attribute cache" ,
"Request interface: attribute integrity" ,
"Request interface: attribute keepalive" ,
"Request interface: attribute isReloadNavigation" ,
"Request interface: attribute isHistoryNavigation" ,
"Request interface: attribute body" ,
"Request interface: attribute bodyUsed" ,
2021-05-31 05:03:17 -04:00
"Request interface: new Request('about:blank') must inherit property \"destination\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"referrer\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"referrerPolicy\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"mode\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"credentials\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"cache\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"integrity\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"keepalive\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"isReloadNavigation\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"isHistoryNavigation\" with the proper type" ,
2021-04-26 07:02:49 -04:00
"Response interface: operation error()" ,
"Response interface: operation redirect(USVString, optional unsigned short)" ,
"Response interface: attribute body" ,
"Response interface: attribute bodyUsed" ,
2021-06-05 13:29:41 -04:00
"Response interface: calling redirect(USVString, optional unsigned short) on new Response() with too few arguments must throw TypeError" ,
2021-04-26 07:02:49 -04:00
"Window interface: operation fetch(RequestInfo, optional RequestInit)"
2021-06-06 09:37:17 -04:00
] ,
2021-10-08 11:44:38 -04:00
"idlharness.any.worker.html" : [
"Request interface: attribute destination" ,
"Request interface: attribute referrer" ,
"Request interface: attribute referrerPolicy" ,
"Request interface: attribute mode" ,
"Request interface: attribute credentials" ,
"Request interface: attribute cache" ,
"Request interface: attribute integrity" ,
"Request interface: attribute keepalive" ,
"Request interface: attribute isReloadNavigation" ,
"Request interface: attribute isHistoryNavigation" ,
"Request interface: attribute body" ,
"Request interface: attribute bodyUsed" ,
"Request interface: new Request('about:blank') must inherit property \"destination\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"referrer\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"referrerPolicy\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"mode\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"credentials\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"cache\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"integrity\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"keepalive\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"isReloadNavigation\" with the proper type" ,
"Request interface: new Request('about:blank') must inherit property \"isHistoryNavigation\" with the proper type" ,
"Response interface: operation error()" ,
"Response interface: operation redirect(USVString, optional unsigned short)" ,
"Response interface: attribute body" ,
"Response interface: attribute bodyUsed" ,
"Response interface: calling redirect(USVString, optional unsigned short) on new Response() with too few arguments must throw TypeError" ,
"WorkerGlobalScope interface: operation fetch(RequestInfo, optional RequestInit)" ,
"WorkerGlobalScope interface: self must inherit property \"fetch(RequestInfo, optional RequestInit)\" with the proper type" ,
"WorkerGlobalScope interface: calling fetch(RequestInfo, optional RequestInit) on self with too few arguments must throw TypeError"
] ,
2021-06-06 09:37:17 -04:00
"abort" : {
"general.any.html" : [
"response.arrayBuffer() rejects if already aborted" ,
"response.blob() rejects if already aborted" ,
"response.formData() rejects if already aborted" ,
"response.json() rejects if already aborted" ,
2021-09-07 17:50:22 -04:00
"response.text() rejects if already aborted" ,
"Call text() twice on aborted response"
2021-10-08 11:44:38 -04:00
] ,
"general.any.worker.html" : [
"response.arrayBuffer() rejects if already aborted" ,
"response.blob() rejects if already aborted" ,
"response.formData() rejects if already aborted" ,
"response.json() rejects if already aborted" ,
"response.text() rejects if already aborted" ,
"Call text() twice on aborted response"
2021-06-06 09:37:17 -04:00
]
}
2021-04-10 17:38:15 -04:00
} ,
2021-09-25 09:27:34 -04:00
"content-encoding" : {
"bad-gzip-body.any.html" : [
"Consuming the body of a resource with bad gzip content with arrayBuffer() should reject" ,
"Consuming the body of a resource with bad gzip content with blob() should reject" ,
"Consuming the body of a resource with bad gzip content with formData() should reject" ,
"Consuming the body of a resource with bad gzip content with json() should reject" ,
"Consuming the body of a resource with bad gzip content with text() should reject"
] ,
"bad-gzip-body.any.worker.html" : [
"Consuming the body of a resource with bad gzip content with arrayBuffer() should reject" ,
"Consuming the body of a resource with bad gzip content with blob() should reject" ,
"Consuming the body of a resource with bad gzip content with formData() should reject" ,
"Consuming the body of a resource with bad gzip content with json() should reject" ,
"Consuming the body of a resource with bad gzip content with text() should reject"
]
} ,
"content-length" : {
"api-and-duplicate-headers.any.html" : [
"XMLHttpRequest and duplicate Content-Length/Content-Type headers" ,
"fetch() and duplicate Content-Length/Content-Type headers"
] ,
"api-and-duplicate-headers.any.worker.html" : [
"XMLHttpRequest and duplicate Content-Length/Content-Type headers" ,
"fetch() and duplicate Content-Length/Content-Type headers"
] ,
"parsing.window.html" : [
"Input: \"Content-Length: aaaah\\r\\nContent-Length: aaaah\". Expected: 42." ,
"Input: \"Content-Length: aaaah, aaaah\". Expected: 42." ,
"Input: \"Content-Length: aaaah\". Expected: 42." ,
"Input: \"Content-Length: 42s\". Expected: 42." ,
"Input: \"Content-Length: 30s\". Expected: 42." ,
"Input: \"Content-Length: -1\". Expected: 42." ,
"Input: \"Content-Length: 0x20\". Expected: 42." ,
"Input: \"Content-Length: 030\\r\\nContent-Length: 30\". Expected: network error." ,
"Input: \"Content-Length: 030, 30\". Expected: network error." ,
"Input: \"Content-Length: \\\"30\\\"\". Expected: 42." ,
"Input: \"Content-Length: \". Expected: 42."
] ,
"too-long.window.html" : [
"Content-Length header value of network response exceeds response body"
]
} ,
"content-type" : {
"response.window.html" : [
"<iframe>: separate response Content-Type: text/plain" ,
"<iframe>: combined response Content-Type: text/plain" ,
"<iframe>: separate response Content-Type: text/plain " ,
"<iframe>: combined response Content-Type: text/plain " ,
"<iframe>: separate response Content-Type: text/html text/plain" ,
"<iframe>: combined response Content-Type: text/html text/plain" ,
"<iframe>: separate response Content-Type: text/plain;charset=gbk text/html" ,
"<iframe>: combined response Content-Type: text/plain;charset=gbk text/html" ,
"<iframe>: separate response Content-Type: text/plain;charset=gbk text/html;charset=windows-1254" ,
"<iframe>: combined response Content-Type: text/plain;charset=gbk text/html;charset=windows-1254" ,
"<iframe>: separate response Content-Type: text/plain;charset=gbk text/plain" ,
"<iframe>: combined response Content-Type: text/plain;charset=gbk text/plain" ,
"<iframe>: separate response Content-Type: text/plain;charset=gbk text/plain;charset=windows-1252" ,
"<iframe>: combined response Content-Type: text/plain;charset=gbk text/plain;charset=windows-1252" ,
"<iframe>: separate response Content-Type: text/html;charset=gbk text/html;x=\",text/plain" ,
"<iframe>: combined response Content-Type: text/html;charset=gbk text/html;x=\",text/plain" ,
"<iframe>: separate response Content-Type: text/plain;charset=gbk;x=foo text/plain" ,
"<iframe>: combined response Content-Type: text/plain;charset=gbk;x=foo text/plain" ,
"<iframe>: separate response Content-Type: text/html;charset=gbk text/plain text/html" ,
"<iframe>: combined response Content-Type: text/html;charset=gbk text/plain text/html" ,
"<iframe>: separate response Content-Type: text/plain */*" ,
"<iframe>: combined response Content-Type: text/plain */*" ,
"<iframe>: separate response Content-Type: text/html */*" ,
"<iframe>: combined response Content-Type: text/html */*" ,
"<iframe>: separate response Content-Type: */* text/html" ,
"<iframe>: combined response Content-Type: */* text/html" ,
"<iframe>: separate response Content-Type: text/plain */*;charset=gbk" ,
"<iframe>: combined response Content-Type: text/plain */*;charset=gbk" ,
"<iframe>: separate response Content-Type: text/html */*;charset=gbk" ,
"<iframe>: combined response Content-Type: text/html */*;charset=gbk" ,
"<iframe>: separate response Content-Type: text/html;x=\" text/plain" ,
"<iframe>: combined response Content-Type: text/html;x=\" text/plain" ,
"<iframe>: separate response Content-Type: text/html;\" text/plain" ,
"<iframe>: combined response Content-Type: text/html;\" text/plain" ,
"<iframe>: separate response Content-Type: text/html;\" \\\" text/plain" ,
"<iframe>: combined response Content-Type: text/html;\" \\\" text/plain" ,
"<iframe>: separate response Content-Type: text/html;\" \\\" text/plain \";charset=GBK" ,
"<iframe>: combined response Content-Type: text/html;\" \\\" text/plain \";charset=GBK" ,
"<iframe>: separate response Content-Type: text/html;\" \" text/plain" ,
"<iframe>: combined response Content-Type: text/html;\" \" text/plain" ,
"fetch(): separate response Content-Type: text/plain;charset=gbk text/plain" ,
"fetch(): combined response Content-Type: text/plain;charset=gbk text/plain" ,
"Request: combined response Content-Type: text/plain;charset=gbk text/plain" ,
"Response: combined response Content-Type: text/plain;charset=gbk text/plain" ,
"fetch(): separate response Content-Type: text/html;charset=gbk text/html;x=\",text/plain" ,
"fetch(): combined response Content-Type: text/html;charset=gbk text/html;x=\",text/plain" ,
"Request: combined response Content-Type: text/html;charset=gbk text/html;x=\",text/plain" ,
"Response: combined response Content-Type: text/html;charset=gbk text/html;x=\",text/plain" ,
"fetch(): separate response Content-Type: text/plain;charset=gbk;x=foo text/plain" ,
"fetch(): combined response Content-Type: text/plain;charset=gbk;x=foo text/plain" ,
"Request: combined response Content-Type: text/plain;charset=gbk;x=foo text/plain" ,
"Response: combined response Content-Type: text/plain;charset=gbk;x=foo text/plain" ,
"fetch(): combined response Content-Type: text/html;x=\" text/plain" ,
"fetch(): separate response Content-Type: text/html;\" \\\" text/plain \";charset=GBK" ,
"fetch(): combined response Content-Type: text/html;\" \\\" text/plain \";charset=GBK" ,
"Request: combined response Content-Type: text/html;\" \\\" text/plain \";charset=GBK" ,
"Response: combined response Content-Type: text/html;\" \\\" text/plain \";charset=GBK"
]
} ,
2021-04-10 17:38:15 -04:00
"data-urls" : {
2021-05-09 10:32:30 -04:00
"base64.any.html" : true ,
2021-10-08 11:44:38 -04:00
"base64.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"processing.any.html" : [
2021-04-10 17:38:15 -04:00
"\"data:text/plain;a=\\\",\\\",X\""
2021-10-08 11:44:38 -04:00
] ,
"processing.any.worker.html" : [
"\"data:text/plain;a=\\\",\\\",X\""
2021-04-10 17:38:15 -04:00
]
2021-09-25 09:27:34 -04:00
} ,
"h1-parsing" : {
"lone-cr.window.html" : [
"Parsing response with a lone CR before message-body (HTTP/1.1 200 OK\nHeader: Value\r\n\nBody)"
] ,
"status-code.window.html" : [
"HTTP/1.1 0 OK " ,
"HTTP/1.1 1 OK " ,
"HTTP/1.1 99 NOT OK " ,
"HTTP/1.1 077 77 " ,
"HTTP/1.1 099 HELLO " ,
"HTTP/1.1 200 " ,
"HTTP/1.1 999 DOES IT MATTER "
]
} ,
"range" : {
"general.any.html" : [
"Privileged header not allowed for guard type: request-no-cors" ,
"Fetch with range header will be sent with Accept-Encoding: identity"
] ,
"general.any.worker.html" : [
"Privileged header not allowed for guard type: request-no-cors" ,
"Fetch with range header will be sent with Accept-Encoding: identity"
] ,
"general.window.html" : [
"Script executed from partial response" ,
"Fetch with range header will be sent with Accept-Encoding: identity"
]
2021-01-28 15:37:21 -05:00
}
2021-01-30 13:22:24 -05:00
} ,
"FileAPI" : {
"blob" : {
2021-05-09 10:32:30 -04:00
"Blob-array-buffer.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Blob-array-buffer.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"Blob-constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Blob-constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"Blob-slice-overflow.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Blob-slice-overflow.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"Blob-slice.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Blob-slice.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"Blob-stream.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Blob-stream.any.worker.html" : true ,
"Blob-text.any.html" : true ,
"Blob-text.any.worker.html" : true ,
"Blob-in-worker.worker.html" : true
2021-02-04 09:05:36 -05:00
} ,
"file" : {
2021-06-01 12:24:31 -04:00
"File-constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"File-constructor.any.worker.html" : false ,
2021-06-03 14:48:09 -04:00
"send-file-formdata-controls.any.html" : true ,
2021-10-08 11:44:38 -04:00
"send-file-formdata-controls.any.worker.html" : true ,
2021-06-03 14:48:09 -04:00
"send-file-formdata-punctuation.any.html" : true ,
2021-10-08 11:44:38 -04:00
"send-file-formdata-punctuation.any.worker.html" : true ,
2021-06-01 12:24:31 -04:00
"send-file-formdata-utf-8.any.html" : true ,
2021-10-08 11:44:38 -04:00
"send-file-formdata-utf-8.any.worker.html" : true ,
"send-file-formdata.any.html" : true ,
"send-file-formdata.any.worker.html" : true ,
"Worker-read-file-constructor.worker.html" : true
2021-04-06 06:55:05 -04:00
} ,
2021-05-09 10:32:30 -04:00
"fileReader.any.html" : true ,
2021-10-08 11:44:38 -04:00
"fileReader.any.worker.html" : true ,
2021-04-07 19:23:26 -04:00
"url" : {
2021-05-09 10:32:30 -04:00
"url-format.any.html" : true ,
2021-10-08 11:44:38 -04:00
"url-format.any.worker.html" : true ,
"url-with-fetch.any.html" : true ,
"url-with-fetch.any.worker.html" : true
2021-04-08 09:05:08 -04:00
} ,
"reading-data-section" : {
2021-05-09 10:32:30 -04:00
"Determining-Encoding.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Determining-Encoding.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"FileReader-event-handler-attributes.any.html" : true ,
2021-10-08 11:44:38 -04:00
"FileReader-event-handler-attributes.any.worker.html" : true ,
2021-07-14 06:08:42 -04:00
"FileReader-multiple-reads.any.html" : true ,
2021-10-08 11:44:38 -04:00
"FileReader-multiple-reads.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"filereader_abort.any.html" : true ,
2021-10-08 11:44:38 -04:00
"filereader_abort.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"filereader_error.any.html" : true ,
2021-10-08 11:44:38 -04:00
"filereader_error.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"filereader_events.any.html" : false ,
2021-10-08 11:44:38 -04:00
"filereader_events.any.worker.html" : false ,
2021-05-09 10:32:30 -04:00
"filereader_readAsArrayBuffer.any.html" : true ,
2021-10-08 11:44:38 -04:00
"filereader_readAsArrayBuffer.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"filereader_readAsBinaryString.any.html" : true ,
2021-10-08 11:44:38 -04:00
"filereader_readAsBinaryString.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"filereader_readAsDataURL.any.html" : true ,
2021-10-08 11:44:38 -04:00
"filereader_readAsDataURL.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"filereader_readAsText.any.html" : true ,
2021-10-08 11:44:38 -04:00
"filereader_readAsText.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"filereader_readystate.any.html" : true ,
2021-10-08 11:44:38 -04:00
"filereader_readystate.any.worker.html" : true ,
"filereader_result.any.html" : true ,
"filereader_result.any.worker.html" : true
2021-08-09 12:49:31 -04:00
} ,
"idlharness.any.html" : [
"FileList interface: existence and properties of interface object" ,
"FileList interface object length" ,
"FileList interface object name" ,
"FileList interface: existence and properties of interface prototype object" ,
"FileList interface: existence and properties of interface prototype object's \"constructor\" property" ,
"FileList interface: existence and properties of interface prototype object's @@unscopables property" ,
"FileList interface: operation item(unsigned long)" ,
2021-09-12 09:35:05 -04:00
"FileList interface: attribute length"
2021-10-08 11:44:38 -04:00
] ,
"idlharness.any.worker.html" : [
"FileList interface: existence and properties of interface object" ,
"FileList interface object length" ,
"FileList interface object name" ,
"FileList interface: existence and properties of interface prototype object" ,
"FileList interface: existence and properties of interface prototype object's \"constructor\" property" ,
"FileList interface: existence and properties of interface prototype object's @@unscopables property" ,
"FileList interface: operation item(unsigned long)" ,
"FileList interface: attribute length" ,
"FileReaderSync interface: existence and properties of interface object" ,
"FileReaderSync interface object length" ,
"FileReaderSync interface object name" ,
"FileReaderSync interface: existence and properties of interface prototype object" ,
"FileReaderSync interface: existence and properties of interface prototype object's \"constructor\" property" ,
"FileReaderSync interface: existence and properties of interface prototype object's @@unscopables property" ,
"FileReaderSync interface: operation readAsArrayBuffer(Blob)" ,
"FileReaderSync interface: operation readAsBinaryString(Blob)" ,
"FileReaderSync interface: operation readAsText(Blob, optional DOMString)" ,
"FileReaderSync interface: operation readAsDataURL(Blob)"
] ,
"FileReaderSync.worker.html" : false ,
"idlharness.worker.html" : [
"FileList interface: existence and properties of interface object" ,
"FileList interface object length" ,
"FileList interface object name" ,
"FileList interface: existence and properties of interface prototype object" ,
"FileList interface: existence and properties of interface prototype object's \"constructor\" property" ,
"FileList interface: existence and properties of interface prototype object's @@unscopables property" ,
"FileList interface: operation item(unsigned long)" ,
"FileList interface: attribute length" ,
"FileReaderSync interface: existence and properties of interface object" ,
"FileReaderSync interface object length" ,
"FileReaderSync interface object name" ,
"FileReaderSync interface: existence and properties of interface prototype object" ,
"FileReaderSync interface: existence and properties of interface prototype object's \"constructor\" property" ,
"FileReaderSync interface: existence and properties of interface prototype object's @@unscopables property" ,
"FileReaderSync interface: operation readAsArrayBuffer(Blob)" ,
"FileReaderSync interface: operation readAsBinaryString(Blob)" ,
"FileReaderSync interface: operation readAsText(Blob, optional DOMString)" ,
"FileReaderSync interface: operation readAsDataURL(Blob)" ,
"FileReaderSync must be primary interface of new FileReaderSync()" ,
"Stringification of new FileReaderSync()" ,
"FileReaderSync interface: new FileReaderSync() must inherit property \"readAsArrayBuffer(Blob)\" with the proper type" ,
"FileReaderSync interface: calling readAsArrayBuffer(Blob) on new FileReaderSync() with too few arguments must throw TypeError" ,
"FileReaderSync interface: new FileReaderSync() must inherit property \"readAsBinaryString(Blob)\" with the proper type" ,
"FileReaderSync interface: calling readAsBinaryString(Blob) on new FileReaderSync() with too few arguments must throw TypeError" ,
"FileReaderSync interface: new FileReaderSync() must inherit property \"readAsText(Blob, optional DOMString)\" with the proper type" ,
"FileReaderSync interface: calling readAsText(Blob, optional DOMString) on new FileReaderSync() with too few arguments must throw TypeError" ,
"FileReaderSync interface: new FileReaderSync() must inherit property \"readAsDataURL(Blob)\" with the proper type" ,
"FileReaderSync interface: calling readAsDataURL(Blob) on new FileReaderSync() with too few arguments must throw TypeError"
2021-08-09 12:49:31 -04:00
]
2021-02-13 06:59:46 -05:00
} ,
"html" : {
2021-09-25 09:27:34 -04:00
"semantics" : {
"scripting-1" : {
"the-script-element" : {
"import-assertions" : {
"dynamic-import-with-assertion-argument.any.html" : [
"Dynamic import with an unsupported type assertion should fail"
] ,
"dynamic-import-with-assertion-argument.any.worker.html" : [
"Dynamic import with an unsupported type assertion should fail"
]
} ,
"json-module" : {
"charset-bom.any.html" : [
"UTF-8 BOM should be stripped when decoding JSON module script" ,
"UTF-16BE BOM should result in parse error in JSON module script" ,
"UTF-16LE BOM should result in parse error in JSON module script"
] ,
"charset-bom.any.worker.html" : [
"UTF-8 BOM should be stripped when decoding JSON module script" ,
"UTF-16BE BOM should result in parse error in JSON module script" ,
"UTF-16LE BOM should result in parse error in JSON module script"
] ,
"invalid-content-type.any.html" : true ,
"invalid-content-type.any.worker.html" : true ,
"non-object.any.html" : [
"Non-object: null" ,
"Non-object: true" ,
"Non-object: false" ,
"Non-object: string" ,
"Non-object: array"
] ,
"non-object.any.worker.html" : [
"Non-object: null" ,
"Non-object: true" ,
"Non-object: false" ,
"Non-object: string" ,
"Non-object: array"
] ,
"repeated-imports.any.html" : [
"Importing a specifier that previously failed due to an incorrect type assertion can succeed if the correct assertion is later given" ,
"Importing a specifier that previously succeeded with the correct type assertion should fail if the incorrect assertion is later given" ,
"Two modules of different type with the same specifier can load if the server changes its responses" ,
"If an import previously succeeded for a given specifier/type assertion pair, future uses of that pair should yield the same result"
] ,
"repeated-imports.any.worker.html" : [
"Importing a specifier that previously failed due to an incorrect type assertion can succeed if the correct assertion is later given" ,
"Importing a specifier that previously succeeded with the correct type assertion should fail if the incorrect assertion is later given" ,
"Two modules of different type with the same specifier can load if the server changes its responses" ,
"If an import previously succeeded for a given specifier/type assertion pair, future uses of that pair should yield the same result"
]
} ,
"microtasks" : {
"checkpoint-importScripts.any.worker.html" : true
} ,
"module" : {
"dynamic-import" : {
"blob-url.any.html" : [
"Revoking a blob URL immediately after calling import will not fail"
] ,
"blob-url.any.worker.html" : [
"Revoking a blob URL immediately after calling import will not fail"
2021-10-08 11:44:38 -04:00
] ,
"blob-url.any.worker-module.html" : [
"Revoking a blob URL immediately after calling import will not fail"
2021-09-25 09:27:34 -04:00
]
2021-10-08 11:44:38 -04:00
} ,
"import-meta" : {
"import-meta-url.any.worker-module.html" : true
2021-09-25 09:27:34 -04:00
}
}
}
}
} ,
2021-02-13 06:59:46 -05:00
"webappapis" : {
2021-02-15 20:10:59 -05:00
"atob" : {
2021-10-08 11:44:38 -04:00
"base64.any.html" : true ,
"base64.any.worker.html" : true
2021-02-15 20:10:59 -05:00
} ,
2021-02-13 14:43:36 -05:00
"timers" : {
2021-05-09 10:32:30 -04:00
"cleartimeout-clearinterval.any.html" : true ,
2021-10-08 11:44:38 -04:00
"cleartimeout-clearinterval.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"missing-timeout-setinterval.any.html" : true ,
2021-10-08 11:44:38 -04:00
"missing-timeout-setinterval.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"negative-setinterval.any.html" : true ,
2021-10-08 11:44:38 -04:00
"negative-setinterval.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"negative-settimeout.any.html" : true ,
2021-10-08 11:44:38 -04:00
"negative-settimeout.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"type-long-setinterval.any.html" : true ,
2021-10-08 11:44:38 -04:00
"type-long-setinterval.any.worker.html" : true ,
"type-long-settimeout.any.html" : true ,
"type-long-settimeout.any.worker.html" : true
2021-02-13 14:43:36 -05:00
} ,
2021-02-13 06:59:46 -05:00
"microtask-queuing" : {
2021-07-12 15:15:07 -04:00
"queue-microtask-exceptions.any.html" : false ,
2021-10-08 11:44:38 -04:00
"queue-microtask.any.html" : true ,
"queue-microtask.any.worker.html" : true
2021-08-09 12:49:31 -04:00
} ,
2021-09-25 09:27:34 -04:00
"scripting" : {
"reporterror.any.html" : [
"self.reportError(1)" ,
"self.reportError(TypeError)" ,
"self.reportError(undefined)"
] ,
"reporterror.any.worker.html" : [
"self.reportError(1)" ,
"self.reportError(TypeError)" ,
"self.reportError(undefined)"
]
} ,
2021-08-09 12:49:31 -04:00
"structured-clone" : {
"structured-clone.any.html" : [
"Blob basic" ,
"Blob unpaired high surrogate (invalid utf-8)" ,
"Blob unpaired low surrogate (invalid utf-8)" ,
"Blob paired surrogates (invalid utf-8)" ,
"Blob empty" ,
"Blob NUL" ,
2021-09-25 09:27:34 -04:00
"File basic" ,
"Serializing a non-serializable platform object fails" ,
"An object whose interface is deleted from the global must still deserialize" ,
"A subclass instance will deserialize as its closest serializable superclass" ,
"A detached ArrayBuffer cannot be transferred" ,
"A detached platform object cannot be transferred" ,
"Transferring a non-transferable platform object fails" ,
"A subclass instance will be received as its closest transferable superclass"
2021-10-08 11:44:38 -04:00
] ,
"structured-clone.any.worker.html" : [
"Blob basic" ,
"Blob unpaired high surrogate (invalid utf-8)" ,
"Blob unpaired low surrogate (invalid utf-8)" ,
"Blob paired surrogates (invalid utf-8)" ,
"Blob empty" ,
"Blob NUL" ,
"File basic" ,
"Serializing a non-serializable platform object fails" ,
"An object whose interface is deleted from the global must still deserialize" ,
"A subclass instance will deserialize as its closest serializable superclass" ,
"A detached ArrayBuffer cannot be transferred" ,
"A detached platform object cannot be transferred" ,
"Transferring a non-transferable platform object fails" ,
"A subclass instance will be received as its closest transferable superclass"
2021-08-09 12:49:31 -04:00
]
2021-02-13 06:59:46 -05:00
}
}
2021-04-14 16:49:16 -04:00
} ,
2021-05-10 06:02:47 -04:00
"webstorage" : {
"defineProperty.window.html" : true ,
"set.window.html" : true ,
"storage_enumerate.window.html" : true ,
"storage_in.window.html" : true ,
"event_constructor.window.html" : false ,
"event_initstorageevent.window.html" : false ,
"missing_arguments.window.html" : true ,
"storage_builtins.window.html" : true ,
"storage_clear.window.html" : true ,
"storage_functions_not_overwritten.window.html" : true ,
"storage_getitem.window.html" : true ,
"storage_indexing.window.html" : true ,
"storage_key.window.html" : true ,
"storage_key_empty_string.window.html" : true ,
"storage_length.window.html" : true ,
"storage_local_setitem_quotaexceedederr.window.html" : true ,
"storage_removeitem.window.html" : true ,
"storage_session_setitem_quotaexceedederr.window.html" : true ,
"storage_set_value_enumerate.window.html" : true ,
"storage_setitem.window.html" : [
"localStorage[] = \"\ud800\"" ,
"localStorage[] = \"\udbff\"" ,
"localStorage[] = \"\udc00\"" ,
"localStorage[] = \"\udfff\"" ,
"localStorage[] = \"\ud83ca\"" ,
"localStorage[] = \"a\udf4d\"" ,
"sessionStorage[] = \"\ud800\"" ,
"sessionStorage[] = \"\udbff\"" ,
"sessionStorage[] = \"\udc00\"" ,
"sessionStorage[] = \"\udfff\"" ,
"sessionStorage[] = \"\ud83ca\"" ,
"sessionStorage[] = \"a\udf4d\""
] ,
"storage_string_conversion.window.html" : true ,
"storage_supported_property_names.window.html" : true ,
"symbol-props.window.html" : [
"localStorage: defineProperty not configurable" ,
"sessionStorage: defineProperty not configurable"
]
} ,
2021-05-22 12:08:24 -04:00
"webmessaging" : {
"broadcastchannel" : {
"basics.any.html" : [
"postMessage results in correct event"
] ,
2021-10-08 11:44:38 -04:00
"basics.any.worker.html" : [
"postMessage results in correct event"
] ,
"interface.any.html" : true ,
"interface.any.worker.html" : true
2021-06-21 13:53:52 -04:00
} ,
"message-channels" : {
"basics.any.html" : true ,
2021-10-08 11:44:38 -04:00
"basics.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"close.any.html" : true ,
2021-10-08 11:44:38 -04:00
"close.any.worker.html" : true ,
2021-08-25 07:48:53 -04:00
"dictionary-transferrable.any.html" : true ,
2021-10-08 11:44:38 -04:00
"dictionary-transferrable.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"implied-start.any.html" : true ,
2021-10-08 11:44:38 -04:00
"implied-start.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"no-start.any.html" : true ,
2021-10-08 11:44:38 -04:00
"no-start.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"user-activation.tentative.any.html" : false ,
2021-10-08 11:44:38 -04:00
"user-activation.tentative.any.worker.html" : false ,
2021-06-21 13:53:52 -04:00
"worker-post-after-close.any.html" : false ,
"worker.any.html" : false
} ,
"Channel_postMessage_Blob.any.html" : false ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_Blob.any.worker.html" : false ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_DataCloneErr.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_DataCloneErr.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_clone_port.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_clone_port.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_clone_port_error.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_clone_port_error.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_event_properties.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_event_properties.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_ports_readonly_array.any.html" : false ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_ports_readonly_array.any.worker.html" : false ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_target_source.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_target_source.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_transfer_xsite_incoming_messages.window.html" : false ,
"Channel_postMessage_with_transfer_entangled.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_with_transfer_entangled.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_with_transfer_incoming_messages.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_with_transfer_incoming_messages.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"Channel_postMessage_with_transfer_outgoing_messages.any.html" : true ,
2021-10-08 11:44:38 -04:00
"Channel_postMessage_with_transfer_outgoing_messages.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"MessageEvent-trusted.any.html" : false ,
2021-10-08 11:44:38 -04:00
"MessageEvent-trusted.any.worker.html" : false ,
2021-06-21 13:53:52 -04:00
"MessageEvent-trusted.window.html" : false ,
"MessageEvent.any.html" : true ,
2021-10-08 11:44:38 -04:00
"MessageEvent.any.worker.html" : true ,
2021-06-21 13:53:52 -04:00
"MessagePort_initial_disabled.any.html" : true ,
2021-10-08 11:44:38 -04:00
"MessagePort_initial_disabled.any.worker.html" : true ,
"MessagePort_onmessage_start.any.html" : true ,
"MessagePort_onmessage_start.any.worker.html" : true
2021-05-22 12:08:24 -04:00
} ,
2021-04-14 16:49:16 -04:00
"xhr" : {
"formdata" : {
2021-05-09 10:32:30 -04:00
"append.any.html" : true ,
2021-10-08 11:44:38 -04:00
"append.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"constructor.any.html" : true ,
2021-10-08 11:44:38 -04:00
"constructor.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"delete.any.html" : true ,
2021-10-08 11:44:38 -04:00
"delete.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"foreach.any.html" : true ,
2021-10-08 11:44:38 -04:00
"foreach.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"get.any.html" : true ,
2021-10-08 11:44:38 -04:00
"get.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"has.any.html" : true ,
2021-10-08 11:44:38 -04:00
"has.any.worker.html" : true ,
2021-05-09 10:32:30 -04:00
"set-blob.any.html" : true ,
2021-10-08 11:44:38 -04:00
"set-blob.any.worker.html" : true ,
"set.any.html" : true ,
"set.any.worker.html" : true
2021-04-14 16:49:16 -04:00
}
2021-06-21 06:15:08 -04:00
} ,
"websockets" : {
"Close-1000-reason.any.html" : true ,
"Close-1000-reason.any.html?wpt_flags=h2" : false ,
"Close-1000-reason.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-1000-reason.any.worker.html" : true ,
"Close-1000-reason.any.worker.html?wpt_flags=h2" : false ,
"Close-1000-reason.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-1000-verify-code.any.html" : true ,
"Close-1000-verify-code.any.html?wpt_flags=h2" : false ,
"Close-1000-verify-code.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-1000-verify-code.any.worker.html" : true ,
"Close-1000-verify-code.any.worker.html?wpt_flags=h2" : false ,
"Close-1000-verify-code.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-1000.any.html" : true ,
"Close-1000.any.html?wpt_flags=h2" : false ,
"Close-1000.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-1000.any.worker.html" : true ,
"Close-1000.any.worker.html?wpt_flags=h2" : false ,
"Close-1000.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-1005-verify-code.any.html" : true ,
"Close-1005-verify-code.any.html?wpt_flags=h2" : false ,
"Close-1005-verify-code.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-1005-verify-code.any.worker.html" : true ,
"Close-1005-verify-code.any.worker.html?wpt_flags=h2" : false ,
"Close-1005-verify-code.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-1005.any.html" : true ,
"Close-1005.any.html?wpt_flags=h2" : false ,
"Close-1005.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-1005.any.worker.html" : true ,
"Close-1005.any.worker.html?wpt_flags=h2" : false ,
"Close-1005.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-2999-reason.any.html" : true ,
"Close-2999-reason.any.html?wpt_flags=h2" : false ,
"Close-2999-reason.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-2999-reason.any.worker.html" : true ,
"Close-2999-reason.any.worker.html?wpt_flags=h2" : false ,
"Close-2999-reason.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-3000-reason.any.html" : true ,
"Close-3000-reason.any.html?wpt_flags=h2" : false ,
"Close-3000-reason.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-3000-reason.any.worker.html" : true ,
"Close-3000-reason.any.worker.html?wpt_flags=h2" : false ,
"Close-3000-reason.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-3000-verify-code.any.html" : true ,
"Close-3000-verify-code.any.html?wpt_flags=h2" : false ,
"Close-3000-verify-code.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-3000-verify-code.any.worker.html" : true ,
"Close-3000-verify-code.any.worker.html?wpt_flags=h2" : false ,
"Close-3000-verify-code.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-4999-reason.any.html" : true ,
"Close-4999-reason.any.html?wpt_flags=h2" : false ,
"Close-4999-reason.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-4999-reason.any.worker.html" : true ,
"Close-4999-reason.any.worker.html?wpt_flags=h2" : false ,
"Close-4999-reason.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-Reason-124Bytes.any.html" : true ,
"Close-Reason-124Bytes.any.html?wpt_flags=h2" : false ,
"Close-Reason-124Bytes.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-Reason-124Bytes.any.worker.html" : true ,
"Close-Reason-124Bytes.any.worker.html?wpt_flags=h2" : false ,
"Close-Reason-124Bytes.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-onlyReason.any.html" : true ,
"Close-onlyReason.any.html?wpt_flags=h2" : false ,
"Close-onlyReason.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-onlyReason.any.worker.html" : true ,
"Close-onlyReason.any.worker.html?wpt_flags=h2" : false ,
"Close-onlyReason.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-readyState-Closed.any.html" : true ,
"Close-readyState-Closed.any.html?wpt_flags=h2" : false ,
"Close-readyState-Closed.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-readyState-Closed.any.worker.html" : true ,
"Close-readyState-Closed.any.worker.html?wpt_flags=h2" : false ,
"Close-readyState-Closed.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-readyState-Closing.any.html" : true ,
"Close-readyState-Closing.any.html?wpt_flags=h2" : false ,
"Close-readyState-Closing.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-readyState-Closing.any.worker.html" : true ,
"Close-readyState-Closing.any.worker.html?wpt_flags=h2" : false ,
"Close-readyState-Closing.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-reason-unpaired-surrogates.any.html" : true ,
"Close-reason-unpaired-surrogates.any.html?wpt_flags=h2" : false ,
"Close-reason-unpaired-surrogates.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-reason-unpaired-surrogates.any.worker.html" : true ,
"Close-reason-unpaired-surrogates.any.worker.html?wpt_flags=h2" : false ,
"Close-reason-unpaired-surrogates.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-server-initiated-close.any.html" : true ,
"Close-server-initiated-close.any.html?wpt_flags=h2" : false ,
"Close-server-initiated-close.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-server-initiated-close.any.worker.html" : true ,
"Close-server-initiated-close.any.worker.html?wpt_flags=h2" : false ,
"Close-server-initiated-close.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Close-undefined.any.html" : true ,
"Close-undefined.any.html?wpt_flags=h2" : false ,
"Close-undefined.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Close-undefined.any.worker.html" : true ,
"Close-undefined.any.worker.html?wpt_flags=h2" : false ,
"Close-undefined.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-asciiSep-protocol-string.any.html" : true ,
"Create-asciiSep-protocol-string.any.html?wpt_flags=h2" : true ,
"Create-asciiSep-protocol-string.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-asciiSep-protocol-string.any.worker.html" : true ,
"Create-asciiSep-protocol-string.any.worker.html?wpt_flags=h2" : true ,
"Create-asciiSep-protocol-string.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-blocked-port.any.html" : true ,
"Create-blocked-port.any.html?wpt_flags=h2" : [
"Basic check"
] ,
"Create-blocked-port.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-blocked-port.any.worker.html" : true ,
"Create-blocked-port.any.worker.html?wpt_flags=h2" : [
"Basic check"
] ,
"Create-blocked-port.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-extensions-empty.any.html" : true ,
"Create-extensions-empty.any.html?wpt_flags=h2" : false ,
"Create-extensions-empty.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-extensions-empty.any.worker.html" : true ,
"Create-extensions-empty.any.worker.html?wpt_flags=h2" : false ,
"Create-extensions-empty.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-invalid-urls.any.html" : true ,
"Create-invalid-urls.any.html?wpt_flags=h2" : true ,
"Create-invalid-urls.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-invalid-urls.any.worker.html" : true ,
"Create-invalid-urls.any.worker.html?wpt_flags=h2" : true ,
"Create-invalid-urls.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-non-absolute-url.any.html" : true ,
"Create-non-absolute-url.any.html?wpt_flags=h2" : true ,
"Create-non-absolute-url.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-non-absolute-url.any.worker.html" : true ,
"Create-non-absolute-url.any.worker.html?wpt_flags=h2" : true ,
"Create-non-absolute-url.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-nonAscii-protocol-string.any.html" : true ,
"Create-nonAscii-protocol-string.any.html?wpt_flags=h2" : true ,
"Create-nonAscii-protocol-string.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-nonAscii-protocol-string.any.worker.html" : true ,
"Create-nonAscii-protocol-string.any.worker.html?wpt_flags=h2" : true ,
"Create-nonAscii-protocol-string.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-on-worker-shutdown.any.html" : false ,
"Create-protocol-with-space.any.html" : true ,
"Create-protocol-with-space.any.html?wpt_flags=h2" : true ,
"Create-protocol-with-space.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-protocol-with-space.any.worker.html" : true ,
"Create-protocol-with-space.any.worker.html?wpt_flags=h2" : true ,
"Create-protocol-with-space.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-protocols-repeated-case-insensitive.any.html" : true ,
"Create-protocols-repeated-case-insensitive.any.html?wpt_flags=h2" : true ,
"Create-protocols-repeated-case-insensitive.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-protocols-repeated-case-insensitive.any.worker.html" : true ,
"Create-protocols-repeated-case-insensitive.any.worker.html?wpt_flags=h2" : true ,
"Create-protocols-repeated-case-insensitive.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-protocols-repeated.any.html" : true ,
"Create-protocols-repeated.any.html?wpt_flags=h2" : true ,
"Create-protocols-repeated.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-protocols-repeated.any.worker.html" : true ,
"Create-protocols-repeated.any.worker.html?wpt_flags=h2" : true ,
"Create-protocols-repeated.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-url-with-space.any.html" : true ,
"Create-url-with-space.any.html?wpt_flags=h2" : true ,
"Create-url-with-space.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-url-with-space.any.worker.html" : true ,
"Create-url-with-space.any.worker.html?wpt_flags=h2" : true ,
"Create-url-with-space.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-valid-url-array-protocols.any.html" : true ,
"Create-valid-url-array-protocols.any.html?wpt_flags=h2" : false ,
"Create-valid-url-array-protocols.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-valid-url-array-protocols.any.worker.html" : true ,
"Create-valid-url-array-protocols.any.worker.html?wpt_flags=h2" : false ,
"Create-valid-url-array-protocols.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-valid-url-binaryType-blob.any.html" : true ,
"Create-valid-url-binaryType-blob.any.html?wpt_flags=h2" : false ,
"Create-valid-url-binaryType-blob.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-valid-url-binaryType-blob.any.worker.html" : true ,
"Create-valid-url-binaryType-blob.any.worker.html?wpt_flags=h2" : false ,
"Create-valid-url-binaryType-blob.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-valid-url-protocol-empty.any.html" : true ,
"Create-valid-url-protocol-empty.any.html?wpt_flags=h2" : true ,
"Create-valid-url-protocol-empty.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-valid-url-protocol-empty.any.worker.html" : true ,
"Create-valid-url-protocol-empty.any.worker.html?wpt_flags=h2" : true ,
"Create-valid-url-protocol-empty.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-valid-url-protocol-setCorrectly.any.html" : true ,
"Create-valid-url-protocol-setCorrectly.any.html?wpt_flags=h2" : false ,
"Create-valid-url-protocol-setCorrectly.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-valid-url-protocol-setCorrectly.any.worker.html" : true ,
"Create-valid-url-protocol-setCorrectly.any.worker.html?wpt_flags=h2" : false ,
"Create-valid-url-protocol-setCorrectly.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-valid-url-protocol-string.any.html" : true ,
"Create-valid-url-protocol-string.any.html?wpt_flags=h2" : false ,
"Create-valid-url-protocol-string.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-valid-url-protocol-string.any.worker.html" : true ,
"Create-valid-url-protocol-string.any.worker.html?wpt_flags=h2" : false ,
"Create-valid-url-protocol-string.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-valid-url-protocol.any.html" : true ,
"Create-valid-url-protocol.any.html?wpt_flags=h2" : false ,
"Create-valid-url-protocol.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-valid-url-protocol.any.worker.html" : true ,
"Create-valid-url-protocol.any.worker.html?wpt_flags=h2" : false ,
"Create-valid-url-protocol.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-valid-url.any.html" : true ,
"Create-valid-url.any.html?wpt_flags=h2" : false ,
"Create-valid-url.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-valid-url.any.worker.html" : true ,
"Create-valid-url.any.worker.html?wpt_flags=h2" : false ,
"Create-valid-url.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Create-wrong-scheme.any.html" : true ,
"Create-wrong-scheme.any.html?wpt_flags=h2" : true ,
"Create-wrong-scheme.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Create-wrong-scheme.any.worker.html" : true ,
"Create-wrong-scheme.any.worker.html?wpt_flags=h2" : true ,
"Create-wrong-scheme.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-0byte-data.any.html" : true ,
"Send-0byte-data.any.html?wpt_flags=h2" : false ,
"Send-0byte-data.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-0byte-data.any.worker.html" : true ,
"Send-0byte-data.any.worker.html?wpt_flags=h2" : false ,
"Send-0byte-data.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-65K-data.any.html" : true ,
"Send-65K-data.any.html?wpt_flags=h2" : false ,
"Send-65K-data.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-65K-data.any.worker.html" : true ,
"Send-65K-data.any.worker.html?wpt_flags=h2" : false ,
"Send-65K-data.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-before-open.any.html" : true ,
"Send-before-open.any.html?wpt_flags=h2" : true ,
"Send-before-open.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-before-open.any.worker.html" : true ,
"Send-before-open.any.worker.html?wpt_flags=h2" : true ,
"Send-before-open.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-65K-arraybuffer.any.html" : true ,
"Send-binary-65K-arraybuffer.any.html?wpt_flags=h2" : false ,
"Send-binary-65K-arraybuffer.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-65K-arraybuffer.any.worker.html" : true ,
"Send-binary-65K-arraybuffer.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-65K-arraybuffer.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybuffer.any.html" : true ,
"Send-binary-arraybuffer.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybuffer.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybuffer.any.worker.html" : true ,
"Send-binary-arraybuffer.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybuffer.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-float32.any.html" : true ,
"Send-binary-arraybufferview-float32.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-float32.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-float32.any.worker.html" : true ,
"Send-binary-arraybufferview-float32.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-float32.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-float64.any.html" : true ,
"Send-binary-arraybufferview-float64.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-float64.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-float64.any.worker.html" : true ,
"Send-binary-arraybufferview-float64.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-float64.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-int16-offset.any.html" : true ,
"Send-binary-arraybufferview-int16-offset.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-int16-offset.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-int16-offset.any.worker.html" : true ,
"Send-binary-arraybufferview-int16-offset.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-int16-offset.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-int32.any.html" : true ,
"Send-binary-arraybufferview-int32.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-int32.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-int32.any.worker.html" : true ,
"Send-binary-arraybufferview-int32.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-int32.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-int8.any.html" : true ,
"Send-binary-arraybufferview-int8.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-int8.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-int8.any.worker.html" : true ,
"Send-binary-arraybufferview-int8.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-int8.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-uint16-offset-length.any.html" : true ,
"Send-binary-arraybufferview-uint16-offset-length.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-uint16-offset-length.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-uint16-offset-length.any.worker.html" : true ,
"Send-binary-arraybufferview-uint16-offset-length.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-uint16-offset-length.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-uint32-offset.any.html" : true ,
"Send-binary-arraybufferview-uint32-offset.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-uint32-offset.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-uint32-offset.any.worker.html" : true ,
"Send-binary-arraybufferview-uint32-offset.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-uint32-offset.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-uint8-offset-length.any.html" : true ,
"Send-binary-arraybufferview-uint8-offset-length.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-uint8-offset-length.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-uint8-offset-length.any.worker.html" : true ,
"Send-binary-arraybufferview-uint8-offset-length.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-uint8-offset-length.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-arraybufferview-uint8-offset.any.html" : true ,
"Send-binary-arraybufferview-uint8-offset.any.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-uint8-offset.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-arraybufferview-uint8-offset.any.worker.html" : true ,
"Send-binary-arraybufferview-uint8-offset.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-arraybufferview-uint8-offset.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-binary-blob.any.html" : true ,
"Send-binary-blob.any.html?wpt_flags=h2" : false ,
"Send-binary-blob.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-binary-blob.any.worker.html" : true ,
"Send-binary-blob.any.worker.html?wpt_flags=h2" : false ,
"Send-binary-blob.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-data.any.html" : true ,
"Send-data.any.html?wpt_flags=h2" : false ,
"Send-data.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-data.any.worker.html" : true ,
"Send-data.any.worker.html?wpt_flags=h2" : false ,
"Send-data.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-null.any.html" : true ,
"Send-null.any.html?wpt_flags=h2" : false ,
"Send-null.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-null.any.worker.html" : true ,
"Send-null.any.worker.html?wpt_flags=h2" : false ,
"Send-null.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-paired-surrogates.any.html" : true ,
"Send-paired-surrogates.any.html?wpt_flags=h2" : false ,
"Send-paired-surrogates.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-paired-surrogates.any.worker.html" : true ,
"Send-paired-surrogates.any.worker.html?wpt_flags=h2" : false ,
"Send-paired-surrogates.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-unicode-data.any.html" : true ,
"Send-unicode-data.any.html?wpt_flags=h2" : false ,
"Send-unicode-data.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-unicode-data.any.worker.html" : true ,
"Send-unicode-data.any.worker.html?wpt_flags=h2" : false ,
"Send-unicode-data.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"Send-unpaired-surrogates.any.html" : true ,
"Send-unpaired-surrogates.any.html?wpt_flags=h2" : false ,
"Send-unpaired-surrogates.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"Send-unpaired-surrogates.any.worker.html" : true ,
"Send-unpaired-surrogates.any.worker.html?wpt_flags=h2" : false ,
"Send-unpaired-surrogates.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"basic-auth.any.html?wpt_flags=h2" : false ,
"basic-auth.any.html?wss" : false ,
2021-10-08 11:44:38 -04:00
"basic-auth.any.worker.html?wpt_flags=h2" : false ,
"basic-auth.any.worker.html?wss" : false ,
2021-06-21 06:15:08 -04:00
"binaryType-wrong-value.any.html" : true ,
"binaryType-wrong-value.any.html?wpt_flags=h2" : false ,
"binaryType-wrong-value.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"binaryType-wrong-value.any.worker.html" : true ,
"binaryType-wrong-value.any.worker.html?wpt_flags=h2" : false ,
"binaryType-wrong-value.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"bufferedAmount-unchanged-by-sync-xhr.any.html" : false ,
"bufferedAmount-unchanged-by-sync-xhr.any.html?wpt_flags=h2" : false ,
"bufferedAmount-unchanged-by-sync-xhr.any.html?wss" : false ,
2021-10-08 11:44:38 -04:00
"bufferedAmount-unchanged-by-sync-xhr.any.worker.html" : false ,
"bufferedAmount-unchanged-by-sync-xhr.any.worker.html?wpt_flags=h2" : false ,
"bufferedAmount-unchanged-by-sync-xhr.any.worker.html?wss" : false ,
2021-06-21 06:15:08 -04:00
"close-invalid.any.html" : true ,
"close-invalid.any.html?wpt_flags=h2" : true ,
"close-invalid.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"close-invalid.any.worker.html" : true ,
"close-invalid.any.worker.html?wpt_flags=h2" : true ,
"close-invalid.any.worker.html?wss" : true ,
2021-06-21 06:15:08 -04:00
"constructor.any.html" : true ,
"constructor.any.html?wpt_flags=h2" : true ,
"constructor.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"constructor.any.worker.html" : true ,
"constructor.any.worker.html?wpt_flags=h2" : true ,
"constructor.any.worker.html?wss" : true ,
2021-10-08 03:53:31 -04:00
"eventhandlers.any.html" : true ,
"eventhandlers.any.html?wpt_flags=h2" : true ,
"eventhandlers.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"eventhandlers.any.worker.html" : true ,
"eventhandlers.any.worker.html?wpt_flags=h2" : true ,
"eventhandlers.any.worker.html?wss" : true ,
2021-08-09 12:49:31 -04:00
"referrer.any.html" : true ,
2021-10-08 11:44:38 -04:00
"referrer.any.worker.html" : true ,
2021-08-09 12:49:31 -04:00
"Close-delayed.any.html" : false ,
"Close-delayed.any.html?wpt_flags=h2" : false ,
2021-08-09 18:28:17 -04:00
"Close-delayed.any.html?wss" : false ,
2021-10-08 11:44:38 -04:00
"Close-delayed.any.worker.html" : false ,
"Close-delayed.any.worker.html?wpt_flags=h2" : false ,
"Close-delayed.any.worker.html?wss" : false ,
2021-08-09 18:28:17 -04:00
"stream" : {
"tentative" : {
"abort.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"abort.any.worker.html?wss" : true ,
2021-09-25 09:27:34 -04:00
"backpressure-receive.any.html?wpt_flags=h2" : false ,
2021-08-09 18:28:17 -04:00
"backpressure-receive.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"backpressure-receive.any.worker.html?wpt_flags=h2" : false ,
"backpressure-receive.any.worker.html?wss" : true ,
2021-09-25 09:27:34 -04:00
"backpressure-send.any.html?wpt_flags=h2" : false ,
2021-08-09 18:28:17 -04:00
"backpressure-send.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"backpressure-send.any.worker.html?wpt_flags=h2" : false ,
"backpressure-send.any.worker.html?wss" : true ,
2021-09-25 09:27:34 -04:00
"close.any.html?wpt_flags=h2" : false ,
2021-08-09 18:28:17 -04:00
"close.any.html?wss" : true ,
2021-10-08 11:44:38 -04:00
"close.any.worker.html?wpt_flags=h2" : false ,
"close.any.worker.html?wss" : true ,
2021-09-25 09:27:34 -04:00
"constructor.any.html?wpt_flags=h2" : false ,
2021-10-08 11:44:38 -04:00
"constructor.any.html?wss" : true ,
"constructor.any.worker.html?wpt_flags=h2" : false ,
"constructor.any.worker.html?wss" : true
2021-08-09 18:28:17 -04:00
}
2021-10-08 11:44:38 -04:00
} ,
"opening-handshake" : {
"003-sets-origin.worker.html" : false
2021-08-09 18:28:17 -04:00
}
2021-08-16 08:29:54 -04:00
} ,
"workers" : {
"Worker-base64.any.worker.html" : true ,
"Worker-call.worker.html" : true ,
"Worker-constructor-proto.any.worker.html" : true ,
"Worker-custom-event.any.worker.html" : true ,
"Worker-formdata.any.worker.html" : [
"Test FormData interface object"
] ,
"Worker-location.sub.any.worker.html" : [
"Test WorkerLocation properties."
] ,
"Worker-replace-event-handler.any.worker.html" : true ,
"Worker-replace-global-constructor.any.worker.html" : true ,
"Worker-replace-self.any.worker.html" : true ,
"WorkerGlobalScope_requestAnimationFrame.tentative.worker.html" : [
"WorkerGlobalScope_requestAnimationFrame"
] ,
"WorkerLocation-origin.sub.window.html" : [
"workerLocation.origin must use ASCII code points"
] ,
2021-10-07 13:39:33 -04:00
"WorkerNavigator-hardware-concurrency.any.worker.html" : true ,
2021-08-16 08:29:54 -04:00
"WorkerNavigator.any.worker.html" : [
"Testing Navigator properties on workers."
] ,
"constructors" : {
"Worker" : {
"DedicatedWorkerGlobalScope-members.worker.html" : [
"existence of onoffline" ,
"existence of ononline"
] ,
"expected-self-properties.worker.html" : [
"existence of XMLHttpRequest" ,
"existence of EventSource" ,
"existence of SharedWorker"
] ,
"unexpected-self-properties.worker.html" : true
}
} ,
"dedicated-worker-from-blob-url.window.html" : [
"Creating a dedicated worker from a blob URL works immediately before revoking."
] ,
"dedicated-worker-in-data-url-context.window.html" : [
"Create a dedicated worker in a data url frame" ,
"Create a dedicated worker in a data url dedicated worker" ,
"Create a data url dedicated worker in a data url frame"
] ,
"examples" : {
"general.any.worker.html" : true ,
"general.worker.html" : true
} ,
"importscripts_mime.any.worker.html" : [
"importScripts() requires scripty MIME types: text/ecmascript is allowed."
] ,
"interfaces" : {
"DedicatedWorkerGlobalScope" : {
"EventTarget.worker.html" : true ,
2021-10-08 03:53:31 -04:00
"onmessage.worker.html" : true ,
2021-08-16 08:29:54 -04:00
"postMessage" : {
"return-value.worker.html" : true
}
} ,
"WorkerGlobalScope" : {
"location" : {
"returns-same-object.any.worker.html" : true
} ,
"self.any.worker.html" : true
} ,
"WorkerUtils" : {
"importScripts" : {
"001.worker.html" : true ,
"002.worker.html" : true ,
2021-09-25 09:27:34 -04:00
"blob-url.worker.html" : [
"A revoked blob URL will fail"
] ,
2021-08-16 08:29:54 -04:00
"catch.sub.any.worker.html" : [
"Cross-origin syntax error" ,
2021-10-27 09:09:58 -04:00
"Cross-origin throw"
2021-09-25 09:27:34 -04:00
] ,
"report-error-cross-origin.sub.any.worker.html" : false ,
"report-error-redirect-to-cross-origin.sub.any.worker.html" : false ,
"report-error-same-origin.sub.any.worker.html" : false
2021-08-16 08:29:54 -04:00
}
}
} ,
"modules" : {
"dedicated-worker-import-blob-url.any.html" : true ,
"dedicated-worker-import-blob-url.any.worker.html" : true ,
"dedicated-worker-import-data-url.any.html" : true ,
"dedicated-worker-import-data-url.any.worker.html" : true ,
"dedicated-worker-import.any.html" : true ,
"dedicated-worker-import.any.worker.html" : true ,
"shared-worker-import-blob-url.window.html" : [
"Static import." ,
"Static import (cross-origin)." ,
"Static import (redirect)." ,
"Nested static import." ,
"Static import and then dynamic import." ,
"Dynamic import." ,
"Nested dynamic import." ,
"Dynamic import and then static import." ,
"eval(import())."
] ,
"shared-worker-import-data-url.window.html" : [
"Static import." ,
"Static import (cross-origin)." ,
"Static import (redirect)." ,
"Nested static import." ,
"Static import and then dynamic import." ,
"Dynamic import." ,
"Nested dynamic import." ,
"Dynamic import and then static import." ,
"eval(import())."
] ,
"shared-worker-import.window.html" : [
"Static import." ,
"Static import (cross-origin)." ,
"Static import (redirect)." ,
"Nested static import." ,
"Static import and then dynamic import." ,
"Dynamic import." ,
"Nested dynamic import." ,
"Dynamic import and then static import." ,
"eval(import())."
]
} ,
"nested_worker.worker.html" : true ,
"nested_worker_close_self.worker.html" : true ,
"nested_worker_importScripts.worker.html" : true ,
"nested_worker_sync_xhr.worker.html" : [
"Nested worker that issues a sync XHR"
] ,
"semantics" : {
"encodings" : {
"004.worker.html" : true
} ,
"interface-objects" : {
"001.worker.html" : [
"The SharedWorker interface object should be exposed." ,
"The ImageData interface object should be exposed." ,
"The ImageBitmap interface object should be exposed." ,
"The CanvasGradient interface object should be exposed." ,
"The CanvasPattern interface object should be exposed." ,
"The CanvasPath interface object should be exposed." ,
"The TextMetrics interface object should be exposed." ,
"The Path2D interface object should be exposed." ,
"The PromiseRejectionEvent interface object should be exposed." ,
"The EventSource interface object should be exposed." ,
"The XMLHttpRequestEventTarget interface object should be exposed." ,
"The XMLHttpRequestUpload interface object should be exposed." ,
"The XMLHttpRequest interface object should be exposed." ,
"The FileList interface object should be exposed." ,
"The FileReaderSync interface object should be exposed." ,
"The IDBRequest interface object should be exposed." ,
"The IDBOpenDBRequest interface object should be exposed." ,
"The IDBVersionChangeEvent interface object should be exposed." ,
"The IDBFactory interface object should be exposed." ,
"The IDBDatabase interface object should be exposed." ,
"The IDBObjectStore interface object should be exposed." ,
"The IDBIndex interface object should be exposed." ,
"The IDBKeyRange interface object should be exposed." ,
"The IDBCursor interface object should be exposed." ,
"The IDBCursorWithValue interface object should be exposed." ,
"The IDBTransaction interface object should be exposed."
] ,
"002.worker.html" : true
} ,
"multiple-workers" : {
"exposure.any.html" : [
"SharedWorker exposure"
] ,
"exposure.any.worker.html" : true
}
} ,
"shared-worker-from-blob-url.window.html" : [
"Creating a shared worker from a blob URL works." ,
"Creating a shared worker from a blob URL works immediately before revoking." ,
"Connecting to a shared worker on a revoked blob URL works."
] ,
"shared-worker-in-data-url-context.window.html" : [
"Create a shared worker in a data url frame" ,
"Create a data url shared worker in a data url frame"
] ,
"worker-performance.worker.html" : [
"Resource timing seems to work in workers" ,
"performance.clearResourceTimings in workers" ,
"performance.setResourceTimingBufferSize in workers"
]
2021-09-08 05:14:29 -04:00
} ,
"urlpattern" : {
2021-09-25 09:27:34 -04:00
"urlpattern-compare.any.html" : [
"Component: pathname Left: {\"pathname\":\"/foo/a\"} Right: {\"pathname\":\"/foo/b\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/b\"} Right: {\"pathname\":\"/foo/bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/bar\"} Right: {\"pathname\":\"/foo/:bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/\"} Right: {\"pathname\":\"/foo/:bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/:bar\"} Right: {\"pathname\":\"/foo/*\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/(bar)\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/{bar}+\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}+\"} Right: {\"pathname\":\"/foo/{bar}?\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}?\"} Right: {\"pathname\":\"/foo/{bar}*\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/(123)\"} Right: {\"pathname\":\"/foo/(12)\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/:b\"} Right: {\"pathname\":\"/foo/:a\"}" ,
"Component: pathname Left: {\"pathname\":\"*/foo\"} Right: {\"pathname\":\"*\"}" ,
"Component: port Left: {\"port\":\"9\"} Right: {\"port\":\"100\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo/{:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"fo{o/:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar/}?baz\"}" ,
"Component: pathname Left: \"https://a.example.com/b?a\" Right: \"https://b.example.com/a?b\"" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}/baz\"} Right: {\"pathname\":\"/foo/bar/baz\"}" ,
"Component: protocol Left: {\"protocol\":\"a\"} Right: {\"protocol\":\"b\"}" ,
"Component: username Left: {\"username\":\"a\"} Right: {\"username\":\"b\"}" ,
"Component: password Left: {\"password\":\"a\"} Right: {\"password\":\"b\"}" ,
"Component: hostname Left: {\"hostname\":\"a\"} Right: {\"hostname\":\"b\"}" ,
"Component: search Left: {\"search\":\"a\"} Right: {\"search\":\"b\"}" ,
"Component: hash Left: {\"hash\":\"a\"} Right: {\"hash\":\"b\"}"
] ,
"urlpattern-compare.any.worker.html" : [
"Component: pathname Left: {\"pathname\":\"/foo/a\"} Right: {\"pathname\":\"/foo/b\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/b\"} Right: {\"pathname\":\"/foo/bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/bar\"} Right: {\"pathname\":\"/foo/:bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/\"} Right: {\"pathname\":\"/foo/:bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/:bar\"} Right: {\"pathname\":\"/foo/*\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/(bar)\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/{bar}+\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}+\"} Right: {\"pathname\":\"/foo/{bar}?\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}?\"} Right: {\"pathname\":\"/foo/{bar}*\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/(123)\"} Right: {\"pathname\":\"/foo/(12)\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/:b\"} Right: {\"pathname\":\"/foo/:a\"}" ,
"Component: pathname Left: {\"pathname\":\"*/foo\"} Right: {\"pathname\":\"*\"}" ,
"Component: port Left: {\"port\":\"9\"} Right: {\"port\":\"100\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo/{:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"fo{o/:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar/}?baz\"}" ,
"Component: pathname Left: \"https://a.example.com/b?a\" Right: \"https://b.example.com/a?b\"" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}/baz\"} Right: {\"pathname\":\"/foo/bar/baz\"}" ,
"Component: protocol Left: {\"protocol\":\"a\"} Right: {\"protocol\":\"b\"}" ,
"Component: username Left: {\"username\":\"a\"} Right: {\"username\":\"b\"}" ,
"Component: password Left: {\"password\":\"a\"} Right: {\"password\":\"b\"}" ,
"Component: hostname Left: {\"hostname\":\"a\"} Right: {\"hostname\":\"b\"}" ,
"Component: search Left: {\"search\":\"a\"} Right: {\"search\":\"b\"}" ,
"Component: hash Left: {\"hash\":\"a\"} Right: {\"hash\":\"b\"}"
] ,
"urlpattern-compare.https.any.html" : [
"Component: pathname Left: {\"pathname\":\"/foo/a\"} Right: {\"pathname\":\"/foo/b\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/b\"} Right: {\"pathname\":\"/foo/bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/bar\"} Right: {\"pathname\":\"/foo/:bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/\"} Right: {\"pathname\":\"/foo/:bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/:bar\"} Right: {\"pathname\":\"/foo/*\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/(bar)\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/{bar}+\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}+\"} Right: {\"pathname\":\"/foo/{bar}?\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}?\"} Right: {\"pathname\":\"/foo/{bar}*\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/(123)\"} Right: {\"pathname\":\"/foo/(12)\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/:b\"} Right: {\"pathname\":\"/foo/:a\"}" ,
"Component: pathname Left: {\"pathname\":\"*/foo\"} Right: {\"pathname\":\"*\"}" ,
"Component: port Left: {\"port\":\"9\"} Right: {\"port\":\"100\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo/{:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"fo{o/:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar/}?baz\"}" ,
"Component: pathname Left: \"https://a.example.com/b?a\" Right: \"https://b.example.com/a?b\"" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}/baz\"} Right: {\"pathname\":\"/foo/bar/baz\"}" ,
"Component: protocol Left: {\"protocol\":\"a\"} Right: {\"protocol\":\"b\"}" ,
"Component: username Left: {\"username\":\"a\"} Right: {\"username\":\"b\"}" ,
"Component: password Left: {\"password\":\"a\"} Right: {\"password\":\"b\"}" ,
"Component: hostname Left: {\"hostname\":\"a\"} Right: {\"hostname\":\"b\"}" ,
"Component: search Left: {\"search\":\"a\"} Right: {\"search\":\"b\"}" ,
"Component: hash Left: {\"hash\":\"a\"} Right: {\"hash\":\"b\"}"
] ,
"urlpattern-compare.https.any.worker.html" : [
"Component: pathname Left: {\"pathname\":\"/foo/a\"} Right: {\"pathname\":\"/foo/b\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/b\"} Right: {\"pathname\":\"/foo/bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/bar\"} Right: {\"pathname\":\"/foo/:bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/\"} Right: {\"pathname\":\"/foo/:bar\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/:bar\"} Right: {\"pathname\":\"/foo/*\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/(bar)\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/{bar}+\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}+\"} Right: {\"pathname\":\"/foo/{bar}?\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}?\"} Right: {\"pathname\":\"/foo/{bar}*\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/(123)\"} Right: {\"pathname\":\"/foo/(12)\"}" ,
"Component: pathname Left: {\"pathname\":\"/foo/:b\"} Right: {\"pathname\":\"/foo/:a\"}" ,
"Component: pathname Left: {\"pathname\":\"*/foo\"} Right: {\"pathname\":\"*\"}" ,
"Component: port Left: {\"port\":\"9\"} Right: {\"port\":\"100\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo/{:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"fo{o/:bar}?/baz\"}" ,
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar/}?baz\"}" ,
"Component: pathname Left: \"https://a.example.com/b?a\" Right: \"https://b.example.com/a?b\"" ,
"Component: pathname Left: {\"pathname\":\"/foo/{bar}/baz\"} Right: {\"pathname\":\"/foo/bar/baz\"}" ,
"Component: protocol Left: {\"protocol\":\"a\"} Right: {\"protocol\":\"b\"}" ,
"Component: username Left: {\"username\":\"a\"} Right: {\"username\":\"b\"}" ,
"Component: password Left: {\"password\":\"a\"} Right: {\"password\":\"b\"}" ,
"Component: hostname Left: {\"hostname\":\"a\"} Right: {\"hostname\":\"b\"}" ,
"Component: search Left: {\"search\":\"a\"} Right: {\"search\":\"b\"}" ,
"Component: hash Left: {\"hash\":\"a\"} Right: {\"hash\":\"b\"}"
] ,
2021-09-08 05:14:29 -04:00
"urlpattern.any.html" : [
2021-09-25 09:27:34 -04:00
"Pattern: [{\"pathname\":\"/foo/bar\"}] Inputs: [\"./foo/bar\",\"https://example.com\"]" ,
"Pattern: [{\"hostname\":\"bad\\\\:hostname\"}] Inputs: undefined" ,
"Pattern: [{\"hostname\":\"bad|hostname\"}] Inputs: undefined" ,
"Pattern: [] Inputs: [\"https://example.com/\"]" ,
"Pattern: [] Inputs: [{}]" ,
"Pattern: [] Inputs: []"
2021-09-08 05:14:29 -04:00
] ,
"urlpattern.any.worker.html" : [
2021-09-25 09:27:34 -04:00
"Pattern: [{\"pathname\":\"/foo/bar\"}] Inputs: [\"./foo/bar\",\"https://example.com\"]" ,
"Pattern: [{\"hostname\":\"bad\\\\:hostname\"}] Inputs: undefined" ,
"Pattern: [{\"hostname\":\"bad|hostname\"}] Inputs: undefined" ,
"Pattern: [] Inputs: [\"https://example.com/\"]" ,
"Pattern: [] Inputs: [{}]" ,
"Pattern: [] Inputs: []"
2021-09-08 05:14:29 -04:00
] ,
"urlpattern.https.any.html" : [
2021-09-25 09:27:34 -04:00
"Pattern: [{\"pathname\":\"/foo/bar\"}] Inputs: [\"./foo/bar\",\"https://example.com\"]" ,
"Pattern: [{\"hostname\":\"bad\\\\:hostname\"}] Inputs: undefined" ,
"Pattern: [{\"hostname\":\"bad|hostname\"}] Inputs: undefined" ,
"Pattern: [] Inputs: [\"https://example.com/\"]" ,
"Pattern: [] Inputs: [{}]" ,
"Pattern: [] Inputs: []"
2021-09-08 05:14:29 -04:00
] ,
"urlpattern.https.any.worker.html" : [
2021-09-25 09:27:34 -04:00
"Pattern: [{\"pathname\":\"/foo/bar\"}] Inputs: [\"./foo/bar\",\"https://example.com\"]" ,
"Pattern: [{\"hostname\":\"bad\\\\:hostname\"}] Inputs: undefined" ,
"Pattern: [{\"hostname\":\"bad|hostname\"}] Inputs: undefined" ,
"Pattern: [] Inputs: [\"https://example.com/\"]" ,
"Pattern: [] Inputs: [{}]" ,
"Pattern: [] Inputs: []"
2021-09-08 05:14:29 -04:00
]
2021-01-27 09:06:18 -05:00
}
2021-11-03 05:47:40 -04:00
}