mirror of
https://github.com/denoland/deno.git
synced 2024-12-01 16:51:13 -05:00
22d6e43c37
* 'request-upload.h2' and 'redirect-upload.h2' only work with a functional HTTP2 test harness server, otherwise they're flaky. * Fetch request streaming tests require a server that doesn't choke on requests that use 'Transfer-Encoding: chunked'.
9329 lines
No EOL
855 KiB
JSON
9329 lines
No EOL
855 KiB
JSON
{
|
||
"WebCryptoAPI": {
|
||
"getRandomValues.any.html": true,
|
||
"getRandomValues.any.worker.html": true,
|
||
"derive_bits_keys": {
|
||
"ecdh_bits.https.any.html": false,
|
||
"ecdh_bits.https.any.worker.html": false,
|
||
"ecdh_keys.https.any.html": false,
|
||
"ecdh_keys.https.any.worker.html": false,
|
||
"hkdf.https.any.html?1-1000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage"
|
||
],
|
||
"hkdf.https.any.html?1001-2000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key"
|
||
],
|
||
"hkdf.https.any.html?2001-3000": [
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage"
|
||
],
|
||
"hkdf.https.any.html?3001-last": [
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key"
|
||
],
|
||
"hkdf.https.any.worker.html?1-1000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage"
|
||
],
|
||
"hkdf.https.any.worker.html?1001-2000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key"
|
||
],
|
||
"hkdf.https.any.worker.html?2001-3000": [
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage"
|
||
],
|
||
"hkdf.https.any.worker.html?3001-last": [
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.html?1-1000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.html?1001-2000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.html?2001-3000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage"
|
||
],
|
||
"pbkdf2.https.any.html?3001-4000": [
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.html?4001-5000": [
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.html?5001-6000": [
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.html?6001-7000": [
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.html?7001-8000": [
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 0 iterations"
|
||
],
|
||
"pbkdf2.https.any.html?8001-last": [
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 0 iterations"
|
||
],
|
||
"pbkdf2.https.any.worker.html?1-1000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.worker.html?1001-2000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.worker.html?2001-3000": [
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage"
|
||
],
|
||
"pbkdf2.https.any.worker.html?3001-4000": [
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.worker.html?4001-5000": [
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.worker.html?5001-6000": [
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.worker.html?6001-7000": [
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key"
|
||
],
|
||
"pbkdf2.https.any.worker.html?7001-8000": [
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 0 iterations"
|
||
],
|
||
"pbkdf2.https.any.worker.html?8001-last": [
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key",
|
||
"Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 0 iterations",
|
||
"Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 0 iterations"
|
||
]
|
||
},
|
||
"digest": {
|
||
"digest.https.any.html": true,
|
||
"digest.https.any.worker.html": true
|
||
},
|
||
"encrypt_decrypt": {
|
||
"aes_cbc.https.any.html": false,
|
||
"aes_cbc.https.any.worker.html": false,
|
||
"aes_ctr.https.any.html": [
|
||
"AES-CTR 128-bit key",
|
||
"AES-CTR 192-bit key",
|
||
"AES-CTR 256-bit key",
|
||
"AES-CTR 128-bit key with altered plaintext",
|
||
"AES-CTR 192-bit key with altered plaintext",
|
||
"AES-CTR 256-bit key with altered plaintext",
|
||
"AES-CTR 128-bit key decryption",
|
||
"AES-CTR 192-bit key decryption",
|
||
"AES-CTR 256-bit key decryption",
|
||
"AES-CTR 128-bit key decryption with altered ciphertext",
|
||
"AES-CTR 192-bit key decryption with altered ciphertext",
|
||
"AES-CTR 256-bit key decryption with altered ciphertext",
|
||
"AES-CTR 128-bit key without encrypt usage",
|
||
"AES-CTR 192-bit key without encrypt usage",
|
||
"AES-CTR 256-bit key without encrypt usage",
|
||
"AES-CTR 128-bit key with mismatched key and algorithm",
|
||
"AES-CTR 192-bit key with mismatched key and algorithm",
|
||
"AES-CTR 256-bit key with mismatched key and algorithm",
|
||
"AES-CTR 128-bit key without decrypt usage",
|
||
"AES-CTR 192-bit key without decrypt usage",
|
||
"AES-CTR 256-bit key without decrypt usage",
|
||
"AES-CTR 128-bit key, 0-bit counter",
|
||
"AES-CTR 128-bit key, 129-bit counter",
|
||
"AES-CTR 192-bit key, 0-bit counter",
|
||
"AES-CTR 192-bit key, 129-bit counter",
|
||
"AES-CTR 256-bit key, 0-bit counter",
|
||
"AES-CTR 256-bit key, 129-bit counter",
|
||
"AES-CTR 128-bit key, 0-bit counter decryption",
|
||
"AES-CTR 128-bit key, 129-bit counter decryption",
|
||
"AES-CTR 192-bit key, 0-bit counter decryption",
|
||
"AES-CTR 192-bit key, 129-bit counter decryption",
|
||
"AES-CTR 256-bit key, 0-bit counter decryption",
|
||
"AES-CTR 256-bit key, 129-bit counter decryption"
|
||
],
|
||
"aes_ctr.https.any.worker.html": [
|
||
"AES-CTR 128-bit key",
|
||
"AES-CTR 192-bit key",
|
||
"AES-CTR 256-bit key",
|
||
"AES-CTR 128-bit key with altered plaintext",
|
||
"AES-CTR 192-bit key with altered plaintext",
|
||
"AES-CTR 256-bit key with altered plaintext",
|
||
"AES-CTR 128-bit key decryption",
|
||
"AES-CTR 192-bit key decryption",
|
||
"AES-CTR 256-bit key decryption",
|
||
"AES-CTR 128-bit key decryption with altered ciphertext",
|
||
"AES-CTR 192-bit key decryption with altered ciphertext",
|
||
"AES-CTR 256-bit key decryption with altered ciphertext",
|
||
"AES-CTR 128-bit key without encrypt usage",
|
||
"AES-CTR 192-bit key without encrypt usage",
|
||
"AES-CTR 256-bit key without encrypt usage",
|
||
"AES-CTR 128-bit key with mismatched key and algorithm",
|
||
"AES-CTR 192-bit key with mismatched key and algorithm",
|
||
"AES-CTR 256-bit key with mismatched key and algorithm",
|
||
"AES-CTR 128-bit key without decrypt usage",
|
||
"AES-CTR 192-bit key without decrypt usage",
|
||
"AES-CTR 256-bit key without decrypt usage",
|
||
"AES-CTR 128-bit key, 0-bit counter",
|
||
"AES-CTR 128-bit key, 129-bit counter",
|
||
"AES-CTR 192-bit key, 0-bit counter",
|
||
"AES-CTR 192-bit key, 129-bit counter",
|
||
"AES-CTR 256-bit key, 0-bit counter",
|
||
"AES-CTR 256-bit key, 129-bit counter",
|
||
"AES-CTR 128-bit key, 0-bit counter decryption",
|
||
"AES-CTR 128-bit key, 129-bit counter decryption",
|
||
"AES-CTR 192-bit key, 0-bit counter decryption",
|
||
"AES-CTR 192-bit key, 129-bit counter decryption",
|
||
"AES-CTR 256-bit key, 0-bit counter decryption",
|
||
"AES-CTR 256-bit key, 129-bit counter decryption"
|
||
],
|
||
"aes_gcm.https.any.html": [
|
||
"AES-GCM 128-bit key, 32-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag",
|
||
"AES-GCM 128-bit key, 64-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag",
|
||
"AES-GCM 128-bit key, 96-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag",
|
||
"AES-GCM 128-bit key, 104-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag",
|
||
"AES-GCM 128-bit key, 112-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag",
|
||
"AES-GCM 128-bit key, 120-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag",
|
||
"AES-GCM 128-bit key, 128-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag",
|
||
"AES-GCM 192-bit key, 32-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag",
|
||
"AES-GCM 192-bit key, 64-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag",
|
||
"AES-GCM 192-bit key, 96-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag",
|
||
"AES-GCM 192-bit key, 104-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag",
|
||
"AES-GCM 192-bit key, 112-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag",
|
||
"AES-GCM 192-bit key, 120-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag",
|
||
"AES-GCM 192-bit key, 128-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag",
|
||
"AES-GCM 256-bit key, 32-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag",
|
||
"AES-GCM 256-bit key, 64-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag",
|
||
"AES-GCM 256-bit key, 96-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag",
|
||
"AES-GCM 256-bit key, 104-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag",
|
||
"AES-GCM 256-bit key, 112-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag",
|
||
"AES-GCM 256-bit key, 120-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag",
|
||
"AES-GCM 256-bit key, 128-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag",
|
||
"AES-GCM 128-bit key, 32-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 64-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 96-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 104-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 112-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 120-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 128-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 32-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 64-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 96-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 104-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 112-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 120-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 128-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 32-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 64-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 96-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 104-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 112-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 120-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 128-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 32-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag decryption",
|
||
"AES-GCM 128-bit key, 64-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag decryption",
|
||
"AES-GCM 128-bit key, 96-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag decryption",
|
||
"AES-GCM 128-bit key, 104-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag decryption",
|
||
"AES-GCM 128-bit key, 112-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag decryption",
|
||
"AES-GCM 128-bit key, 120-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag decryption",
|
||
"AES-GCM 128-bit key, 128-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag decryption",
|
||
"AES-GCM 192-bit key, 32-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag decryption",
|
||
"AES-GCM 192-bit key, 64-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag decryption",
|
||
"AES-GCM 192-bit key, 96-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag decryption",
|
||
"AES-GCM 192-bit key, 104-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag decryption",
|
||
"AES-GCM 192-bit key, 112-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag decryption",
|
||
"AES-GCM 192-bit key, 120-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag decryption",
|
||
"AES-GCM 192-bit key, 128-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag decryption",
|
||
"AES-GCM 256-bit key, 32-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag decryption",
|
||
"AES-GCM 256-bit key, 64-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag decryption",
|
||
"AES-GCM 256-bit key, 96-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag decryption",
|
||
"AES-GCM 256-bit key, 104-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag decryption",
|
||
"AES-GCM 256-bit key, 112-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag decryption",
|
||
"AES-GCM 256-bit key, 120-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag decryption",
|
||
"AES-GCM 256-bit key, 128-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag decryption",
|
||
"AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 32-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 64-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 96-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 104-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 112-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 120-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 128-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 32-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 64-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 96-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 104-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 112-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 120-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 128-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 32-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 64-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 96-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 104-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 112-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 120-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 128-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 32-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 64-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 96-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 104-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 112-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 120-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 128-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 32-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 64-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 96-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 104-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 112-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 120-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 128-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 32-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 64-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 96-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 104-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 112-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 120-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 128-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, illegal tag length 24-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 48-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 72-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 95-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 129-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 256-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 24-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 48-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 72-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 95-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 129-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 256-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 24-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 48-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 72-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 95-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 129-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 256-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 24-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 48-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 72-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 95-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 129-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 256-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 24-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 48-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 72-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 95-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 129-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 256-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 24-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 48-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 72-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 95-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 129-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 256-bits decryption"
|
||
],
|
||
"aes_gcm.https.any.worker.html": [
|
||
"AES-GCM 128-bit key, 32-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag",
|
||
"AES-GCM 128-bit key, 64-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag",
|
||
"AES-GCM 128-bit key, 96-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag",
|
||
"AES-GCM 128-bit key, 104-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag",
|
||
"AES-GCM 128-bit key, 112-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag",
|
||
"AES-GCM 128-bit key, 120-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag",
|
||
"AES-GCM 128-bit key, 128-bit tag",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag",
|
||
"AES-GCM 192-bit key, 32-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag",
|
||
"AES-GCM 192-bit key, 64-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag",
|
||
"AES-GCM 192-bit key, 96-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag",
|
||
"AES-GCM 192-bit key, 104-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag",
|
||
"AES-GCM 192-bit key, 112-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag",
|
||
"AES-GCM 192-bit key, 120-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag",
|
||
"AES-GCM 192-bit key, 128-bit tag",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag",
|
||
"AES-GCM 256-bit key, 32-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag",
|
||
"AES-GCM 256-bit key, 64-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag",
|
||
"AES-GCM 256-bit key, 96-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag",
|
||
"AES-GCM 256-bit key, 104-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag",
|
||
"AES-GCM 256-bit key, 112-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag",
|
||
"AES-GCM 256-bit key, 120-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag",
|
||
"AES-GCM 256-bit key, 128-bit tag",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag",
|
||
"AES-GCM 128-bit key, 32-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 64-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 96-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 104-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 112-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 120-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 128-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 32-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 64-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 96-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 104-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 112-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 120-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, 128-bit tag with altered plaintext",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 32-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 64-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 96-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 104-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 112-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 120-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, 128-bit tag with altered plaintext",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext",
|
||
"AES-GCM 128-bit key, 32-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag decryption",
|
||
"AES-GCM 128-bit key, 64-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag decryption",
|
||
"AES-GCM 128-bit key, 96-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag decryption",
|
||
"AES-GCM 128-bit key, 104-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag decryption",
|
||
"AES-GCM 128-bit key, 112-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag decryption",
|
||
"AES-GCM 128-bit key, 120-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag decryption",
|
||
"AES-GCM 128-bit key, 128-bit tag decryption",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag decryption",
|
||
"AES-GCM 192-bit key, 32-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag decryption",
|
||
"AES-GCM 192-bit key, 64-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag decryption",
|
||
"AES-GCM 192-bit key, 96-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag decryption",
|
||
"AES-GCM 192-bit key, 104-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag decryption",
|
||
"AES-GCM 192-bit key, 112-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag decryption",
|
||
"AES-GCM 192-bit key, 120-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag decryption",
|
||
"AES-GCM 192-bit key, 128-bit tag decryption",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag decryption",
|
||
"AES-GCM 256-bit key, 32-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag decryption",
|
||
"AES-GCM 256-bit key, 64-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag decryption",
|
||
"AES-GCM 256-bit key, 96-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag decryption",
|
||
"AES-GCM 256-bit key, 104-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag decryption",
|
||
"AES-GCM 256-bit key, 112-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag decryption",
|
||
"AES-GCM 256-bit key, 120-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag decryption",
|
||
"AES-GCM 256-bit key, 128-bit tag decryption",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag decryption",
|
||
"AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
|
||
"AES-GCM 128-bit key, 32-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 64-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 96-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 104-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 112-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 120-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 128-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 32-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 64-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 96-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 104-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 112-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 120-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, 128-bit tag without encrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 32-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 64-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 96-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 104-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 112-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 120-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, 128-bit tag without encrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage",
|
||
"AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
|
||
"AES-GCM 128-bit key, 32-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 64-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 96-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 104-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 112-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 120-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, 128-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 32-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 64-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 96-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 104-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 112-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 120-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, 128-bit tag without decrypt usage",
|
||
"AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 32-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 64-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 96-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 104-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 112-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 120-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, 128-bit tag without decrypt usage",
|
||
"AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage",
|
||
"AES-GCM 128-bit key, illegal tag length 24-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 48-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 72-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 95-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 129-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 256-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 24-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 48-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 72-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 95-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 129-bits",
|
||
"AES-GCM 192-bit key, illegal tag length 256-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 24-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 48-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 72-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 95-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 129-bits",
|
||
"AES-GCM 256-bit key, illegal tag length 256-bits",
|
||
"AES-GCM 128-bit key, illegal tag length 24-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 48-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 72-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 95-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 129-bits decryption",
|
||
"AES-GCM 128-bit key, illegal tag length 256-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 24-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 48-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 72-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 95-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 129-bits decryption",
|
||
"AES-GCM 192-bit key, illegal tag length 256-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 24-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 48-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 72-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 95-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 129-bits decryption",
|
||
"AES-GCM 256-bit key, illegal tag length 256-bits decryption"
|
||
],
|
||
"rsa_oaep.https.any.html": [
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label no encrypt usage"
|
||
],
|
||
"rsa_oaep.https.any.worker.html": [
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption with altered ciphertext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label using publicKey to decrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label no decrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label with altered plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label too long plaintext",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label using privateKey to encrypt",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and no label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and no label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and no label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and no label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and empty label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and empty label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and empty label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and empty label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-1 and a label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-256 and a label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-384 and a label no encrypt usage",
|
||
"importVectorKeys step: RSA-OAEP with SHA-512 and a label no encrypt usage"
|
||
]
|
||
},
|
||
"generateKey": {
|
||
"failures_AES-CBC.https.any.html": true,
|
||
"failures_AES-CBC.https.any.worker.html": true,
|
||
"failures_AES-CTR.https.any.html": true,
|
||
"failures_AES-CTR.https.any.worker.html": true,
|
||
"failures_AES-GCM.https.any.html": true,
|
||
"failures_AES-GCM.https.any.worker.html": true,
|
||
"failures_AES-KW.https.any.html": true,
|
||
"failures_AES-KW.https.any.worker.html": true,
|
||
"failures_ECDH.https.any.html": [
|
||
"Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [])",
|
||
"Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [])"
|
||
],
|
||
"failures_ECDH.https.any.worker.html": [
|
||
"Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [])",
|
||
"Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [])"
|
||
],
|
||
"failures_ECDSA.https.any.html": [
|
||
"Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [])",
|
||
"Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [])"
|
||
],
|
||
"failures_ECDSA.https.any.worker.html": [
|
||
"Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [])",
|
||
"Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [])"
|
||
],
|
||
"failures_HMAC.https.any.html": true,
|
||
"failures_HMAC.https.any.worker.html": true,
|
||
"failures_RSA-OAEP.https.any.html": true,
|
||
"failures_RSA-OAEP.https.any.worker.html": true,
|
||
"failures_RSA-PSS.https.any.html": true,
|
||
"failures_RSA-PSS.https.any.worker.html": true,
|
||
"failures_RSASSA-PKCS1-v1_5.https.any.html": true,
|
||
"failures_RSASSA-PKCS1-v1_5.https.any.worker.html": true,
|
||
"successes_AES-CBC.https.any.html": true,
|
||
"successes_AES-CBC.https.any.worker.html": true,
|
||
"successes_AES-CTR.https.any.html": true,
|
||
"successes_AES-CTR.https.any.worker.html": true,
|
||
"successes_AES-GCM.https.any.html": true,
|
||
"successes_AES-GCM.https.any.worker.html": true,
|
||
"successes_AES-KW.https.any.html": true,
|
||
"successes_AES-KW.https.any.worker.html": true,
|
||
"successes_HMAC.https.any.html": true,
|
||
"successes_HMAC.https.any.worker.html": true,
|
||
"successes_ECDH.https.any.html": [
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])"
|
||
],
|
||
"successes_ECDH.https.any.worker.html": [
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
|
||
"Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])"
|
||
],
|
||
"successes_ECDSA.https.any.html": [
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])"
|
||
],
|
||
"successes_ECDSA.https.any.worker.html": [
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
|
||
"Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])"
|
||
],
|
||
"successes_RSA-OAEP.https.any.html?1-10": true,
|
||
"successes_RSA-OAEP.https.any.html?101-110": true,
|
||
"successes_RSA-OAEP.https.any.html?11-20": true,
|
||
"successes_RSA-OAEP.https.any.html?111-120": true,
|
||
"successes_RSA-OAEP.https.any.html?121-130": true,
|
||
"successes_RSA-OAEP.https.any.html?131-140": true,
|
||
"successes_RSA-OAEP.https.any.html?141-150": true,
|
||
"successes_RSA-OAEP.https.any.html?151-last": true,
|
||
"successes_RSA-OAEP.https.any.html?21-30": true,
|
||
"successes_RSA-OAEP.https.any.html?31-40": true,
|
||
"successes_RSA-OAEP.https.any.html?41-50": true,
|
||
"successes_RSA-OAEP.https.any.html?51-60": true,
|
||
"successes_RSA-OAEP.https.any.html?61-70": true,
|
||
"successes_RSA-OAEP.https.any.html?71-80": true,
|
||
"successes_RSA-OAEP.https.any.html?81-90": true,
|
||
"successes_RSA-OAEP.https.any.html?91-100": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?1-10": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?101-110": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?11-20": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?111-120": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?121-130": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?131-140": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?141-150": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?151-last": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?21-30": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?31-40": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?41-50": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?51-60": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?61-70": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?71-80": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?81-90": true,
|
||
"successes_RSA-OAEP.https.any.worker.html?91-100": true,
|
||
"successes_RSA-PSS.https.any.html?1-10": true,
|
||
"successes_RSA-PSS.https.any.html?11-20": true,
|
||
"successes_RSA-PSS.https.any.html?21-30": true,
|
||
"successes_RSA-PSS.https.any.html?31-last": true,
|
||
"successes_RSA-PSS.https.any.worker.html?1-10": true,
|
||
"successes_RSA-PSS.https.any.worker.html?11-20": true,
|
||
"successes_RSA-PSS.https.any.worker.html?21-30": true,
|
||
"successes_RSA-PSS.https.any.worker.html?31-last": true,
|
||
"successes_RSASSA-PKCS1-v1_5.https.any.html?1-10": true,
|
||
"successes_RSASSA-PKCS1-v1_5.https.any.html?11-20": true,
|
||
"successes_RSASSA-PKCS1-v1_5.https.any.html?21-30": true,
|
||
"successes_RSASSA-PKCS1-v1_5.https.any.html?31-last": true,
|
||
"successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10": true,
|
||
"successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20": true,
|
||
"successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30": true,
|
||
"successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last": true
|
||
},
|
||
"historical.any.html": false,
|
||
"historical.any.worker.html": false,
|
||
"idlharness.https.any.html": [
|
||
"SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)",
|
||
"SubtleCrypto interface: crypto.subtle must inherit property \"unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)\" with the proper type",
|
||
"SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError",
|
||
"Window interface: attribute crypto"
|
||
],
|
||
"idlharness.https.any.worker.html": [
|
||
"SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)",
|
||
"SubtleCrypto interface: crypto.subtle must inherit property \"unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)\" with the proper type",
|
||
"SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError",
|
||
"WorkerGlobalScope interface: attribute crypto"
|
||
],
|
||
"import_export": {
|
||
"ec_importKey.https.any.html": false,
|
||
"ec_importKey.https.any.worker.html": false,
|
||
"rsa_importKey.https.any.html": [
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])"
|
||
],
|
||
"rsa_importKey.https.any.worker.html": [
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
|
||
"Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
|
||
"Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])"
|
||
],
|
||
"symmetric_importKey.https.any.html": [
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey])"
|
||
],
|
||
"symmetric_importKey.https.any.worker.html": [
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
|
||
"Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
|
||
"Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
|
||
"Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey])"
|
||
]
|
||
},
|
||
"randomUUID.https.any.html": true,
|
||
"randomUUID.https.any.worker.html": true,
|
||
"sign_verify": {
|
||
"ecdsa.https.any.html": [
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 round trip",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 round trip",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 round trip",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 round trip",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 round trip",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 round trip",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 round trip",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 round trip",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 round trip",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 round trip",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 round trip",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 round trip",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name"
|
||
],
|
||
"ecdsa.https.any.worker.html": [
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 round trip",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 round trip",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 round trip",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 round trip",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 round trip",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 round trip",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 round trip",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 round trip",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 round trip",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 round trip",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 round trip",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 round trip",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name",
|
||
"importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name"
|
||
],
|
||
"hmac.https.any.html": [
|
||
"generate wrong key step: HMAC with SHA-1 signing with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-256 signing with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-384 signing with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-512 signing with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-1 verifying with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-256 verifying with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-384 verifying with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-512 verifying with wrong algorithm name",
|
||
"importVectorKeys step: HMAC with SHA-1 verification",
|
||
"importVectorKeys step: HMAC with SHA-256 verification",
|
||
"importVectorKeys step: HMAC with SHA-384 verification",
|
||
"importVectorKeys step: HMAC with SHA-512 verification",
|
||
"importVectorKeys step: HMAC with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: HMAC with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: HMAC with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: HMAC with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: HMAC with SHA-1 with altered plaintext",
|
||
"importVectorKeys step: HMAC with SHA-256 with altered plaintext",
|
||
"importVectorKeys step: HMAC with SHA-384 with altered plaintext",
|
||
"importVectorKeys step: HMAC with SHA-512 with altered plaintext",
|
||
"importVectorKeys step: HMAC with SHA-1 no verify usage",
|
||
"importVectorKeys step: HMAC with SHA-256 no verify usage",
|
||
"importVectorKeys step: HMAC with SHA-384 no verify usage",
|
||
"importVectorKeys step: HMAC with SHA-512 no verify usage",
|
||
"importVectorKeys step: HMAC with SHA-1 round trip",
|
||
"importVectorKeys step: HMAC with SHA-256 round trip",
|
||
"importVectorKeys step: HMAC with SHA-384 round trip",
|
||
"importVectorKeys step: HMAC with SHA-512 round trip",
|
||
"importVectorKeys step: HMAC with SHA-1 verification failure due to wrong plaintext",
|
||
"importVectorKeys step: HMAC with SHA-256 verification failure due to wrong plaintext",
|
||
"importVectorKeys step: HMAC with SHA-384 verification failure due to wrong plaintext",
|
||
"importVectorKeys step: HMAC with SHA-512 verification failure due to wrong plaintext",
|
||
"importVectorKeys step: HMAC with SHA-1 verification failure due to wrong signature",
|
||
"importVectorKeys step: HMAC with SHA-256 verification failure due to wrong signature",
|
||
"importVectorKeys step: HMAC with SHA-384 verification failure due to wrong signature",
|
||
"importVectorKeys step: HMAC with SHA-512 verification failure due to wrong signature",
|
||
"importVectorKeys step: HMAC with SHA-1 verification failure due to short signature",
|
||
"importVectorKeys step: HMAC with SHA-256 verification failure due to short signature",
|
||
"importVectorKeys step: HMAC with SHA-384 verification failure due to short signature",
|
||
"importVectorKeys step: HMAC with SHA-512 verification failure due to short signature"
|
||
],
|
||
"hmac.https.any.worker.html": [
|
||
"generate wrong key step: HMAC with SHA-1 signing with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-256 signing with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-384 signing with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-512 signing with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-1 verifying with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-256 verifying with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-384 verifying with wrong algorithm name",
|
||
"generate wrong key step: HMAC with SHA-512 verifying with wrong algorithm name",
|
||
"importVectorKeys step: HMAC with SHA-1 verification",
|
||
"importVectorKeys step: HMAC with SHA-256 verification",
|
||
"importVectorKeys step: HMAC with SHA-384 verification",
|
||
"importVectorKeys step: HMAC with SHA-512 verification",
|
||
"importVectorKeys step: HMAC with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: HMAC with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: HMAC with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: HMAC with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: HMAC with SHA-1 with altered plaintext",
|
||
"importVectorKeys step: HMAC with SHA-256 with altered plaintext",
|
||
"importVectorKeys step: HMAC with SHA-384 with altered plaintext",
|
||
"importVectorKeys step: HMAC with SHA-512 with altered plaintext",
|
||
"importVectorKeys step: HMAC with SHA-1 no verify usage",
|
||
"importVectorKeys step: HMAC with SHA-256 no verify usage",
|
||
"importVectorKeys step: HMAC with SHA-384 no verify usage",
|
||
"importVectorKeys step: HMAC with SHA-512 no verify usage",
|
||
"importVectorKeys step: HMAC with SHA-1 round trip",
|
||
"importVectorKeys step: HMAC with SHA-256 round trip",
|
||
"importVectorKeys step: HMAC with SHA-384 round trip",
|
||
"importVectorKeys step: HMAC with SHA-512 round trip",
|
||
"importVectorKeys step: HMAC with SHA-1 verification failure due to wrong plaintext",
|
||
"importVectorKeys step: HMAC with SHA-256 verification failure due to wrong plaintext",
|
||
"importVectorKeys step: HMAC with SHA-384 verification failure due to wrong plaintext",
|
||
"importVectorKeys step: HMAC with SHA-512 verification failure due to wrong plaintext",
|
||
"importVectorKeys step: HMAC with SHA-1 verification failure due to wrong signature",
|
||
"importVectorKeys step: HMAC with SHA-256 verification failure due to wrong signature",
|
||
"importVectorKeys step: HMAC with SHA-384 verification failure due to wrong signature",
|
||
"importVectorKeys step: HMAC with SHA-512 verification failure due to wrong signature",
|
||
"importVectorKeys step: HMAC with SHA-1 verification failure due to short signature",
|
||
"importVectorKeys step: HMAC with SHA-256 verification failure due to short signature",
|
||
"importVectorKeys step: HMAC with SHA-384 verification failure due to short signature",
|
||
"importVectorKeys step: HMAC with SHA-512 verification failure due to short signature"
|
||
],
|
||
"rsa_pkcs.https.any.html": [
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 no verify usage",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 no verify usage",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 no verify usage",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 no verify usage",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 round trip",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 round trip",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 round trip",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 round trip",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext"
|
||
],
|
||
"rsa_pkcs.https.any.worker.html": [
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 no verify usage",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 no verify usage",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 no verify usage",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 no verify usage",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 round trip",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 round trip",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 round trip",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 round trip",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext",
|
||
"importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext"
|
||
],
|
||
"rsa_pss.https.any.html": [
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered plaintext"
|
||
],
|
||
"rsa_pss.https.any.worker.html": [
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification with altered signature after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted with altered plaintext after call",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted using privateKey to verify",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted using publicKey to sign",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted no verify usage",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted round trip",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted signing with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification with wrong algorithm name",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered signature",
|
||
"importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered plaintext",
|
||
"importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered plaintext"
|
||
]
|
||
},
|
||
"wrapKey_unwrapKey": {
|
||
"wrapKey_unwrapKey.https.any.html": false,
|
||
"wrapKey_unwrapKey.https.any.worker.html": false
|
||
}
|
||
},
|
||
"console": {
|
||
"console-is-a-namespace.any.html": true,
|
||
"console-is-a-namespace.any.worker.html": true,
|
||
"console-label-conversion.any.html": true,
|
||
"console-label-conversion.any.worker.html": true,
|
||
"console-namespace-object-class-string.any.html": true,
|
||
"console-namespace-object-class-string.any.worker.html": true,
|
||
"console-tests-historical.any.html": true,
|
||
"console-tests-historical.any.worker.html": true,
|
||
"idlharness.any.html": true,
|
||
"idlharness.any.worker.html": true
|
||
},
|
||
"dom": {
|
||
"abort": {
|
||
"AbortSignal.any.html": true,
|
||
"AbortSignal.any.worker.html": true,
|
||
"event.any.html": true,
|
||
"event.any.worker.html": true
|
||
},
|
||
"events": {
|
||
"AddEventListenerOptions-once.any.html": [
|
||
"Once listener should be added / removed like normal listeners"
|
||
],
|
||
"AddEventListenerOptions-once.any.worker.html": [
|
||
"Once listener should be added / removed like normal listeners"
|
||
],
|
||
"AddEventListenerOptions-passive.any.html": [
|
||
"Supports passive option on addEventListener only",
|
||
"preventDefault should be ignored if-and-only-if the passive option is true",
|
||
"returnValue should be ignored if-and-only-if the passive option is true",
|
||
"passive behavior of one listener should be unaffected by the presence of other listeners",
|
||
"Equivalence of option values"
|
||
],
|
||
"AddEventListenerOptions-passive.any.worker.html": [
|
||
"Supports passive option on addEventListener only",
|
||
"preventDefault should be ignored if-and-only-if the passive option is true",
|
||
"returnValue should be ignored if-and-only-if the passive option is true",
|
||
"passive behavior of one listener should be unaffected by the presence of other listeners",
|
||
"Equivalence of option values"
|
||
],
|
||
"AddEventListenerOptions-signal.any.html": true,
|
||
"AddEventListenerOptions-signal.any.worker.html": true,
|
||
"Event-isTrusted.any.html": true,
|
||
"Event-isTrusted.any.worker.html": true,
|
||
"EventTarget-add-remove-listener.any.html": true,
|
||
"EventTarget-add-remove-listener.any.worker.html": true,
|
||
"EventTarget-addEventListener.any.html": true,
|
||
"EventTarget-addEventListener.any.worker.html": true,
|
||
"EventTarget-removeEventListener.any.html": [
|
||
"removing a null event listener should succeed"
|
||
],
|
||
"EventTarget-removeEventListener.any.worker.html": [
|
||
"removing a null event listener should succeed"
|
||
],
|
||
"EventTarget-constructible.any.html": true,
|
||
"EventTarget-constructible.any.worker.html": true,
|
||
"Event-constructors.any.html": [
|
||
"Untitled 2",
|
||
"Untitled 3"
|
||
],
|
||
"Event-constructors.any.worker.html": [
|
||
"Event constructors 2",
|
||
"Event constructors 3"
|
||
],
|
||
"event-global.worker.html": true
|
||
}
|
||
},
|
||
"encoding": {
|
||
"api-basics.any.html": true,
|
||
"api-basics.any.worker.html": true,
|
||
"api-invalid-label.any.html?1-1000": true,
|
||
"api-invalid-label.any.html?1001-2000": true,
|
||
"api-invalid-label.any.html?2001-3000": true,
|
||
"api-invalid-label.any.html?3001-last": true,
|
||
"api-invalid-label.any.worker.html?1-1000": true,
|
||
"api-invalid-label.any.worker.html?1001-2000": true,
|
||
"api-invalid-label.any.worker.html?2001-3000": true,
|
||
"api-invalid-label.any.worker.html?3001-last": true,
|
||
"api-replacement-encodings.any.html": true,
|
||
"api-replacement-encodings.any.worker.html": true,
|
||
"api-surrogates-utf8.any.html": true,
|
||
"api-surrogates-utf8.any.worker.html": true,
|
||
"encodeInto.any.html": [
|
||
"encodeInto() and a detached output buffer",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler random"
|
||
],
|
||
"encodeInto.any.worker.html": [
|
||
"encodeInto() and a detached output buffer",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with Hi and destination length 0, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with A and destination length 10, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆 and destination length 4, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with 𝌆A and destination length 3, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with \ud834A\udf06A¥Hi and destination length 10, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with A\udf06 and destination length 4, offset 4, filler random",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler 0",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler 128",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 0, filler random",
|
||
"encodeInto() into SharedArrayBuffer with ¥¥ and destination length 4, offset 4, filler random"
|
||
],
|
||
"idlharness.any.html": true,
|
||
"idlharness.any.worker.html": true,
|
||
"iso-2022-jp-decoder.any.html": true,
|
||
"iso-2022-jp-decoder.any.worker.html": true,
|
||
"legacy-mb-schinese": {
|
||
"gb18030": {
|
||
"gb18030-decoder.any.html": true,
|
||
"gb18030-decoder.any.worker.html": true
|
||
},
|
||
"gbk": {
|
||
"gbk-decoder.any.html": true,
|
||
"gbk-decoder.any.worker.html": true
|
||
}
|
||
},
|
||
"replacement-encodings.any.html": false,
|
||
"replacement-encodings.any.worker.html": false,
|
||
"streams": {
|
||
"backpressure.any.html": true,
|
||
"backpressure.any.worker.html": true,
|
||
"decode-attributes.any.html": true,
|
||
"decode-attributes.any.worker.html": true,
|
||
"decode-bad-chunks.any.html": true,
|
||
"decode-bad-chunks.any.worker.html": true,
|
||
"decode-ignore-bom.any.html": true,
|
||
"decode-ignore-bom.any.worker.html": true,
|
||
"decode-incomplete-input.any.html": true,
|
||
"decode-incomplete-input.any.worker.html": true,
|
||
"decode-non-utf8.any.html": true,
|
||
"decode-non-utf8.any.worker.html": true,
|
||
"decode-split-character.any.html": true,
|
||
"decode-split-character.any.worker.html": true,
|
||
"decode-utf8.any.html": [
|
||
"decoding a transferred Uint8Array chunk should give no output",
|
||
"decoding a transferred ArrayBuffer chunk should give no output"
|
||
],
|
||
"decode-utf8.any.worker.html": [
|
||
"decoding a transferred Uint8Array chunk should give no output",
|
||
"decoding a transferred ArrayBuffer chunk should give no output"
|
||
],
|
||
"encode-bad-chunks.any.html": true,
|
||
"encode-bad-chunks.any.worker.html": true,
|
||
"encode-utf8.any.html": true,
|
||
"encode-utf8.any.worker.html": true,
|
||
"readable-writable-properties.any.html": true,
|
||
"readable-writable-properties.any.worker.html": true
|
||
},
|
||
"textdecoder-arguments.any.html": true,
|
||
"textdecoder-arguments.any.worker.html": true,
|
||
"textdecoder-byte-order-marks.any.html": true,
|
||
"textdecoder-byte-order-marks.any.worker.html": true,
|
||
"textdecoder-copy.any.html": true,
|
||
"textdecoder-copy.any.worker.html": true,
|
||
"textdecoder-fatal-single-byte.any.html?1-1000": true,
|
||
"textdecoder-fatal-single-byte.any.html?1001-2000": true,
|
||
"textdecoder-fatal-single-byte.any.html?2001-3000": true,
|
||
"textdecoder-fatal-single-byte.any.html?3001-4000": true,
|
||
"textdecoder-fatal-single-byte.any.html?4001-5000": true,
|
||
"textdecoder-fatal-single-byte.any.html?5001-6000": true,
|
||
"textdecoder-fatal-single-byte.any.html?6001-7000": true,
|
||
"textdecoder-fatal-single-byte.any.html?7001-last": true,
|
||
"textdecoder-fatal-single-byte.any.worker.html?1-1000": true,
|
||
"textdecoder-fatal-single-byte.any.worker.html?1001-2000": true,
|
||
"textdecoder-fatal-single-byte.any.worker.html?2001-3000": true,
|
||
"textdecoder-fatal-single-byte.any.worker.html?3001-4000": true,
|
||
"textdecoder-fatal-single-byte.any.worker.html?4001-5000": true,
|
||
"textdecoder-fatal-single-byte.any.worker.html?5001-6000": true,
|
||
"textdecoder-fatal-single-byte.any.worker.html?6001-7000": true,
|
||
"textdecoder-fatal-single-byte.any.worker.html?7001-last": true,
|
||
"textdecoder-fatal-streaming.any.html": true,
|
||
"textdecoder-fatal-streaming.any.worker.html": true,
|
||
"textdecoder-fatal.any.html": true,
|
||
"textdecoder-fatal.any.worker.html": true,
|
||
"textdecoder-ignorebom.any.html": true,
|
||
"textdecoder-ignorebom.any.worker.html": true,
|
||
"textdecoder-labels.any.html": [
|
||
"unicode11utf8 => UTF-8",
|
||
"unicode20utf8 => UTF-8",
|
||
"x-unicode20utf8 => UTF-8",
|
||
"unicodefffe => UTF-16BE",
|
||
"csunicode => UTF-16LE",
|
||
"iso-10646-ucs-2 => UTF-16LE",
|
||
"ucs-2 => UTF-16LE",
|
||
"unicode => UTF-16LE",
|
||
"unicodefeff => UTF-16LE"
|
||
],
|
||
"textdecoder-labels.any.worker.html": [
|
||
"unicode11utf8 => UTF-8",
|
||
"unicode20utf8 => UTF-8",
|
||
"x-unicode20utf8 => UTF-8",
|
||
"unicodefffe => UTF-16BE",
|
||
"csunicode => UTF-16LE",
|
||
"iso-10646-ucs-2 => UTF-16LE",
|
||
"ucs-2 => UTF-16LE",
|
||
"unicode => UTF-16LE",
|
||
"unicodefeff => UTF-16LE"
|
||
],
|
||
"textdecoder-streaming.any.html": true,
|
||
"textdecoder-streaming.any.worker.html": true,
|
||
"textdecoder-utf16-surrogates.any.html": true,
|
||
"textdecoder-utf16-surrogates.any.worker.html": true,
|
||
"textencoder-constructor-non-utf.any.html": true,
|
||
"textencoder-constructor-non-utf.any.worker.html": true,
|
||
"textencoder-utf16-surrogates.any.html": true,
|
||
"textencoder-utf16-surrogates.any.worker.html": true,
|
||
"unsupported-encodings.any.html": false,
|
||
"unsupported-encodings.any.worker.html": false,
|
||
"single-byte-decoder.window.html?TextDecoder": true,
|
||
"textdecoder-eof.any.html": true,
|
||
"textdecoder-eof.any.worker.html": true
|
||
},
|
||
"hr-time": {
|
||
"monotonic-clock.any.html": true,
|
||
"monotonic-clock.any.worker.html": true,
|
||
"basic.any.html": [
|
||
"Performance interface extends EventTarget."
|
||
],
|
||
"basic.any.worker.html": [
|
||
"Performance interface extends EventTarget."
|
||
],
|
||
"idlharness.any.html": [
|
||
"Performance interface: existence and properties of interface object",
|
||
"Performance interface: existence and properties of interface prototype object",
|
||
"Performance interface: attribute timeOrigin",
|
||
"Performance interface: performance must inherit property \"timeOrigin\" with the proper type",
|
||
"Performance interface: default toJSON operation on performance",
|
||
"Window interface: attribute performance"
|
||
],
|
||
"idlharness.any.worker.html": [
|
||
"Performance interface: existence and properties of interface object",
|
||
"Performance interface: existence and properties of interface prototype object",
|
||
"Performance interface: attribute timeOrigin",
|
||
"Performance interface: performance must inherit property \"timeOrigin\" with the proper type",
|
||
"Performance interface: default toJSON operation on performance",
|
||
"WorkerGlobalScope interface: attribute performance",
|
||
"WorkerGlobalScope interface: self must inherit property \"performance\" with the proper type"
|
||
],
|
||
"window-worker-timeOrigin.window.html": false
|
||
},
|
||
"streams": {
|
||
"idlharness.any.html": [
|
||
"ReadableStreamBYOBReader interface: existence and properties of interface object",
|
||
"ReadableStreamBYOBReader interface object length",
|
||
"ReadableStreamBYOBReader interface object name",
|
||
"ReadableStreamBYOBReader interface: existence and properties of interface prototype object",
|
||
"ReadableStreamBYOBReader interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"ReadableStreamBYOBReader interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"ReadableStreamBYOBReader interface: operation read(ArrayBufferView)",
|
||
"ReadableStreamBYOBReader interface: operation releaseLock()",
|
||
"ReadableStreamBYOBReader interface: attribute closed",
|
||
"ReadableStreamBYOBReader interface: operation cancel(optional any)",
|
||
"ReadableStreamBYOBReader must be primary interface of (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' })",
|
||
"Stringification of (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' })",
|
||
"ReadableStreamBYOBReader interface: (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) must inherit property \"read(ArrayBufferView)\" with the proper type",
|
||
"ReadableStreamBYOBReader interface: calling read(ArrayBufferView) on (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) with too few arguments must throw TypeError",
|
||
"ReadableStreamBYOBReader interface: (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) must inherit property \"releaseLock()\" with the proper type",
|
||
"ReadableStreamBYOBReader interface: (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) must inherit property \"closed\" with the proper type",
|
||
"ReadableStreamBYOBReader interface: (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) must inherit property \"cancel(optional any)\" with the proper type",
|
||
"ReadableStreamBYOBReader interface: calling cancel(optional any) on (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) with too few arguments must throw TypeError",
|
||
"ReadableByteStreamController interface: self.readableByteStreamController must inherit property \"byobRequest\" with the proper type",
|
||
"ReadableStreamBYOBRequest interface: existence and properties of interface object",
|
||
"ReadableStreamBYOBRequest interface object length",
|
||
"ReadableStreamBYOBRequest interface object name",
|
||
"ReadableStreamBYOBRequest interface: existence and properties of interface prototype object",
|
||
"ReadableStreamBYOBRequest interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"ReadableStreamBYOBRequest interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"ReadableStreamBYOBRequest interface: attribute view",
|
||
"ReadableStreamBYOBRequest interface: operation respond(unsigned long long)",
|
||
"ReadableStreamBYOBRequest interface: operation respondWithNewView(ArrayBufferView)",
|
||
"ReadableStreamBYOBRequest must be primary interface of self.readableStreamByobRequest",
|
||
"Stringification of self.readableStreamByobRequest",
|
||
"ReadableStreamBYOBRequest interface: self.readableStreamByobRequest must inherit property \"view\" with the proper type",
|
||
"ReadableStreamBYOBRequest interface: self.readableStreamByobRequest must inherit property \"respond(unsigned long long)\" with the proper type",
|
||
"ReadableStreamBYOBRequest interface: calling respond(unsigned long long) on self.readableStreamByobRequest with too few arguments must throw TypeError",
|
||
"ReadableStreamBYOBRequest interface: self.readableStreamByobRequest must inherit property \"respondWithNewView(ArrayBufferView)\" with the proper type",
|
||
"ReadableStreamBYOBRequest interface: calling respondWithNewView(ArrayBufferView) on self.readableStreamByobRequest with too few arguments must throw TypeError",
|
||
"WritableStreamDefaultController interface: attribute abortReason",
|
||
"WritableStreamDefaultController interface: attribute signal",
|
||
"WritableStreamDefaultController interface: self.writableStreamDefaultController must inherit property \"abortReason\" with the proper type",
|
||
"WritableStreamDefaultController interface: self.writableStreamDefaultController must inherit property \"signal\" with the proper type"
|
||
],
|
||
"idlharness.any.worker.html": [
|
||
"ReadableStreamBYOBReader interface: existence and properties of interface object",
|
||
"ReadableStreamBYOBReader interface object length",
|
||
"ReadableStreamBYOBReader interface object name",
|
||
"ReadableStreamBYOBReader interface: existence and properties of interface prototype object",
|
||
"ReadableStreamBYOBReader interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"ReadableStreamBYOBReader interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"ReadableStreamBYOBReader interface: operation read(ArrayBufferView)",
|
||
"ReadableStreamBYOBReader interface: operation releaseLock()",
|
||
"ReadableStreamBYOBReader interface: attribute closed",
|
||
"ReadableStreamBYOBReader interface: operation cancel(optional any)",
|
||
"ReadableStreamBYOBReader must be primary interface of (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' })",
|
||
"Stringification of (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' })",
|
||
"ReadableStreamBYOBReader interface: (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) must inherit property \"read(ArrayBufferView)\" with the proper type",
|
||
"ReadableStreamBYOBReader interface: calling read(ArrayBufferView) on (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) with too few arguments must throw TypeError",
|
||
"ReadableStreamBYOBReader interface: (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) must inherit property \"releaseLock()\" with the proper type",
|
||
"ReadableStreamBYOBReader interface: (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) must inherit property \"closed\" with the proper type",
|
||
"ReadableStreamBYOBReader interface: (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) must inherit property \"cancel(optional any)\" with the proper type",
|
||
"ReadableStreamBYOBReader interface: calling cancel(optional any) on (new ReadableStream({ type: 'bytes' })).getReader({ mode: 'byob' }) with too few arguments must throw TypeError",
|
||
"ReadableByteStreamController interface: self.readableByteStreamController must inherit property \"byobRequest\" with the proper type",
|
||
"ReadableStreamBYOBRequest interface: existence and properties of interface object",
|
||
"ReadableStreamBYOBRequest interface object length",
|
||
"ReadableStreamBYOBRequest interface object name",
|
||
"ReadableStreamBYOBRequest interface: existence and properties of interface prototype object",
|
||
"ReadableStreamBYOBRequest interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"ReadableStreamBYOBRequest interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"ReadableStreamBYOBRequest interface: attribute view",
|
||
"ReadableStreamBYOBRequest interface: operation respond(unsigned long long)",
|
||
"ReadableStreamBYOBRequest interface: operation respondWithNewView(ArrayBufferView)",
|
||
"ReadableStreamBYOBRequest must be primary interface of self.readableStreamByobRequest",
|
||
"Stringification of self.readableStreamByobRequest",
|
||
"ReadableStreamBYOBRequest interface: self.readableStreamByobRequest must inherit property \"view\" with the proper type",
|
||
"ReadableStreamBYOBRequest interface: self.readableStreamByobRequest must inherit property \"respond(unsigned long long)\" with the proper type",
|
||
"ReadableStreamBYOBRequest interface: calling respond(unsigned long long) on self.readableStreamByobRequest with too few arguments must throw TypeError",
|
||
"ReadableStreamBYOBRequest interface: self.readableStreamByobRequest must inherit property \"respondWithNewView(ArrayBufferView)\" with the proper type",
|
||
"ReadableStreamBYOBRequest interface: calling respondWithNewView(ArrayBufferView) on self.readableStreamByobRequest with too few arguments must throw TypeError",
|
||
"WritableStreamDefaultController interface: attribute abortReason",
|
||
"WritableStreamDefaultController interface: attribute signal",
|
||
"WritableStreamDefaultController interface: self.writableStreamDefaultController must inherit property \"abortReason\" with the proper type",
|
||
"WritableStreamDefaultController interface: self.writableStreamDefaultController must inherit property \"signal\" with the proper type"
|
||
],
|
||
"piping": {
|
||
"abort.any.html": true,
|
||
"abort.any.worker.html": true,
|
||
"close-propagation-backward.any.html": true,
|
||
"close-propagation-backward.any.worker.html": true,
|
||
"close-propagation-forward.any.html": true,
|
||
"close-propagation-forward.any.worker.html": true,
|
||
"error-propagation-backward.any.html": true,
|
||
"error-propagation-backward.any.worker.html": true,
|
||
"error-propagation-forward.any.html": true,
|
||
"error-propagation-forward.any.worker.html": true,
|
||
"flow-control.any.html": true,
|
||
"flow-control.any.worker.html": true,
|
||
"general.any.html": true,
|
||
"general.any.worker.html": true,
|
||
"multiple-propagation.any.html": true,
|
||
"multiple-propagation.any.worker.html": true,
|
||
"pipe-through.any.html": true,
|
||
"pipe-through.any.worker.html": true,
|
||
"then-interception.any.html": true,
|
||
"then-interception.any.worker.html": true,
|
||
"throwing-options.any.html": true,
|
||
"throwing-options.any.worker.html": true,
|
||
"transform-streams.any.html": true,
|
||
"transform-streams.any.worker.html": true
|
||
},
|
||
"queuing-strategies.any.html": true,
|
||
"queuing-strategies.any.worker.html": true,
|
||
"readable-byte-streams": {
|
||
"bad-buffers-and-views.any.html": [
|
||
"ReadableStream with byte source: respond() throws if the BYOB request's buffer has been detached (in the readable state)",
|
||
"ReadableStream with byte source: respond() throws if the BYOB request's buffer has been detached (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer has been detached (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer is zero-length (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view is zero-length on a non-zero-length buffer (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer has a different length (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view has a larger length (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer has been detached (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer is zero-length (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view is non-zero-length (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer has a different length (in the closed state)",
|
||
"ReadableStream with byte source: enqueue() throws if the BYOB request's buffer has been detached (in the readable state)",
|
||
"ReadableStream with byte source: enqueue() throws if the BYOB request's buffer has been detached (in the closed state)",
|
||
"ReadableStream with byte source: read()ing from a closed stream still transfers the buffer",
|
||
"ReadableStream with byte source: read()ing from a stream with queued chunks still transfers the buffer",
|
||
"ReadableStream with byte source: reading into an already-detached buffer rejects",
|
||
"ReadableStream with byte source: reading into a zero-length buffer rejects",
|
||
"ReadableStream with byte source: reading into a zero-length view on a non-zero-length buffer rejects"
|
||
],
|
||
"bad-buffers-and-views.any.worker.html": [
|
||
"ReadableStream with byte source: respond() throws if the BYOB request's buffer has been detached (in the readable state)",
|
||
"ReadableStream with byte source: respond() throws if the BYOB request's buffer has been detached (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer has been detached (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer is zero-length (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view is zero-length on a non-zero-length buffer (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer has a different length (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view has a larger length (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer has been detached (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer is zero-length (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view is non-zero-length (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() throws if the supplied view's buffer has a different length (in the closed state)",
|
||
"ReadableStream with byte source: enqueue() throws if the BYOB request's buffer has been detached (in the readable state)",
|
||
"ReadableStream with byte source: enqueue() throws if the BYOB request's buffer has been detached (in the closed state)",
|
||
"ReadableStream with byte source: read()ing from a closed stream still transfers the buffer",
|
||
"ReadableStream with byte source: read()ing from a stream with queued chunks still transfers the buffer",
|
||
"ReadableStream with byte source: reading into an already-detached buffer rejects",
|
||
"ReadableStream with byte source: reading into a zero-length buffer rejects",
|
||
"ReadableStream with byte source: reading into a zero-length view on a non-zero-length buffer rejects"
|
||
],
|
||
"construct-byob-request.any.html": false,
|
||
"construct-byob-request.any.worker.html": false,
|
||
"general.any.html": [
|
||
"getReader({mode: \"byob\"}) throws on non-bytes streams",
|
||
"ReadableStream with byte source can be constructed with no errors",
|
||
"getReader({mode}) must perform ToString()",
|
||
"ReadableStream with byte source: autoAllocateChunkSize cannot be 0",
|
||
"ReadableStreamBYOBReader can be constructed directly",
|
||
"ReadableStreamBYOBReader constructor requires a ReadableStream argument",
|
||
"ReadableStreamBYOBReader constructor requires an unlocked ReadableStream",
|
||
"ReadableStreamBYOBReader constructor requires a ReadableStream with type \"bytes\"",
|
||
"ReadableStream with byte source: getReader() with mode set to byob, then releaseLock()",
|
||
"ReadableStream with byte source: Test that closing a stream does not release a BYOB reader automatically",
|
||
"ReadableStream with byte source: Test that erroring a stream does not release a BYOB reader automatically",
|
||
"ReadableStream with byte source: autoAllocateChunkSize",
|
||
"ReadableStream with byte source: Mix of auto allocate and BYOB",
|
||
"ReadableStream with byte source: enqueue(), read(view) partially, then read()",
|
||
"ReadableStream with byte source: Respond to pull() by enqueue()",
|
||
"ReadableStream with byte source: Respond to pull() by enqueue() asynchronously",
|
||
"ReadableStream with byte source: Respond to multiple pull() by separate enqueue()",
|
||
"ReadableStream with byte source: read(view), then respond()",
|
||
"ReadableStream with byte source: read(view), then respondWithNewView() with a transferred ArrayBuffer",
|
||
"ReadableStream with byte source: read(view), then respond() with too big value",
|
||
"ReadableStream with byte source: respond(3) to read(view) with 2 element Uint16Array enqueues the 1 byte remainder",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then read(view)",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then cancel() (mode = BYOB)",
|
||
"ReadableStream with byte source: getReader(), read(view), then cancel()",
|
||
"ReadableStream with byte source: cancel() with partially filled pending pull() request",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then read(view) where view.buffer is not fully covered by view",
|
||
"ReadableStream with byte source: Multiple enqueue(), getReader(), then read(view)",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then read(view) with a bigger view",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then read(view) with smaller views",
|
||
"ReadableStream with byte source: enqueue() 1 byte, getReader(), then read(view) with Uint16Array",
|
||
"ReadableStream with byte source: enqueue() 3 byte, getReader(), then read(view) with 2-element Uint16Array",
|
||
"ReadableStream with byte source: read(view) with Uint16Array on close()-d stream with 1 byte enqueue()-d must fail",
|
||
"ReadableStream with byte source: A stream must be errored if close()-d before fulfilling read(view) with Uint16Array",
|
||
"ReadableStream with byte source: read(view), then respond() and close() in pull()",
|
||
"ReadableStream with byte source: read(view) with Uint32Array, then fill it by multiple respond() calls",
|
||
"ReadableStream with byte source: read(view) with Uint32Array, then fill it by multiple enqueue() calls",
|
||
"ReadableStream with byte source: read() twice, then enqueue() twice",
|
||
"ReadableStream with byte source: Multiple read(view), close() and respond()",
|
||
"ReadableStream with byte source: Multiple read(view), big enqueue()",
|
||
"ReadableStream with byte source: Multiple read(view) and multiple enqueue()",
|
||
"ReadableStream with byte source: read(view) with passing undefined as view must fail",
|
||
"ReadableStream with byte source: read(view) with passing an empty object as view must fail",
|
||
"ReadableStream with byte source: Even read(view) with passing ArrayBufferView like object as view must fail",
|
||
"ReadableStream with byte source: read(view) on an errored stream",
|
||
"ReadableStream with byte source: read(view), then error()",
|
||
"ReadableStream with byte source: Throwing in pull function must error the stream",
|
||
"ReadableStream with byte source: Throwing in pull in response to read() must be ignored if the stream is errored in it",
|
||
"ReadableStream with byte source: Throwing in pull in response to read(view) function must error the stream",
|
||
"ReadableStream with byte source: Throwing in pull in response to read(view) must be ignored if the stream is errored in it",
|
||
"calling respond() twice on the same byobRequest should throw",
|
||
"calling respondWithNewView() twice on the same byobRequest should throw",
|
||
"calling respond(0) twice on the same byobRequest should throw even when closed",
|
||
"calling respond() should throw when canceled",
|
||
"pull() resolving should not make releaseLock() possible",
|
||
"ReadableStream with byte source: default reader + autoAllocateChunkSize + byobRequest interaction",
|
||
"ReadableStream with byte source: respondWithNewView() with a smaller view",
|
||
"ReadableStream with byte source: respondWithNewView() with a zero-length view (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() with a transferred non-zero-length view (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() with a transferred zero-length view (in the closed state)"
|
||
],
|
||
"general.any.worker.html": [
|
||
"getReader({mode: \"byob\"}) throws on non-bytes streams",
|
||
"ReadableStream with byte source can be constructed with no errors",
|
||
"getReader({mode}) must perform ToString()",
|
||
"ReadableStream with byte source: autoAllocateChunkSize cannot be 0",
|
||
"ReadableStreamBYOBReader can be constructed directly",
|
||
"ReadableStreamBYOBReader constructor requires a ReadableStream argument",
|
||
"ReadableStreamBYOBReader constructor requires an unlocked ReadableStream",
|
||
"ReadableStreamBYOBReader constructor requires a ReadableStream with type \"bytes\"",
|
||
"ReadableStream with byte source: getReader() with mode set to byob, then releaseLock()",
|
||
"ReadableStream with byte source: Test that closing a stream does not release a BYOB reader automatically",
|
||
"ReadableStream with byte source: Test that erroring a stream does not release a BYOB reader automatically",
|
||
"ReadableStream with byte source: autoAllocateChunkSize",
|
||
"ReadableStream with byte source: Mix of auto allocate and BYOB",
|
||
"ReadableStream with byte source: enqueue(), read(view) partially, then read()",
|
||
"ReadableStream with byte source: Respond to pull() by enqueue()",
|
||
"ReadableStream with byte source: Respond to pull() by enqueue() asynchronously",
|
||
"ReadableStream with byte source: Respond to multiple pull() by separate enqueue()",
|
||
"ReadableStream with byte source: read(view), then respond()",
|
||
"ReadableStream with byte source: read(view), then respondWithNewView() with a transferred ArrayBuffer",
|
||
"ReadableStream with byte source: read(view), then respond() with too big value",
|
||
"ReadableStream with byte source: respond(3) to read(view) with 2 element Uint16Array enqueues the 1 byte remainder",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then read(view)",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then cancel() (mode = BYOB)",
|
||
"ReadableStream with byte source: getReader(), read(view), then cancel()",
|
||
"ReadableStream with byte source: cancel() with partially filled pending pull() request",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then read(view) where view.buffer is not fully covered by view",
|
||
"ReadableStream with byte source: Multiple enqueue(), getReader(), then read(view)",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then read(view) with a bigger view",
|
||
"ReadableStream with byte source: enqueue(), getReader(), then read(view) with smaller views",
|
||
"ReadableStream with byte source: enqueue() 1 byte, getReader(), then read(view) with Uint16Array",
|
||
"ReadableStream with byte source: enqueue() 3 byte, getReader(), then read(view) with 2-element Uint16Array",
|
||
"ReadableStream with byte source: read(view) with Uint16Array on close()-d stream with 1 byte enqueue()-d must fail",
|
||
"ReadableStream with byte source: A stream must be errored if close()-d before fulfilling read(view) with Uint16Array",
|
||
"ReadableStream with byte source: read(view), then respond() and close() in pull()",
|
||
"ReadableStream with byte source: read(view) with Uint32Array, then fill it by multiple respond() calls",
|
||
"ReadableStream with byte source: read(view) with Uint32Array, then fill it by multiple enqueue() calls",
|
||
"ReadableStream with byte source: read() twice, then enqueue() twice",
|
||
"ReadableStream with byte source: Multiple read(view), close() and respond()",
|
||
"ReadableStream with byte source: Multiple read(view), big enqueue()",
|
||
"ReadableStream with byte source: Multiple read(view) and multiple enqueue()",
|
||
"ReadableStream with byte source: read(view) with passing undefined as view must fail",
|
||
"ReadableStream with byte source: read(view) with passing an empty object as view must fail",
|
||
"ReadableStream with byte source: Even read(view) with passing ArrayBufferView like object as view must fail",
|
||
"ReadableStream with byte source: read(view) on an errored stream",
|
||
"ReadableStream with byte source: read(view), then error()",
|
||
"ReadableStream with byte source: Throwing in pull function must error the stream",
|
||
"ReadableStream with byte source: Throwing in pull in response to read() must be ignored if the stream is errored in it",
|
||
"ReadableStream with byte source: Throwing in pull in response to read(view) function must error the stream",
|
||
"ReadableStream with byte source: Throwing in pull in response to read(view) must be ignored if the stream is errored in it",
|
||
"calling respond() twice on the same byobRequest should throw",
|
||
"calling respondWithNewView() twice on the same byobRequest should throw",
|
||
"calling respond(0) twice on the same byobRequest should throw even when closed",
|
||
"calling respond() should throw when canceled",
|
||
"pull() resolving should not make releaseLock() possible",
|
||
"ReadableStream with byte source: default reader + autoAllocateChunkSize + byobRequest interaction",
|
||
"ReadableStream with byte source: respondWithNewView() with a smaller view",
|
||
"ReadableStream with byte source: respondWithNewView() with a zero-length view (in the closed state)",
|
||
"ReadableStream with byte source: respondWithNewView() with a transferred non-zero-length view (in the readable state)",
|
||
"ReadableStream with byte source: respondWithNewView() with a transferred zero-length view (in the closed state)"
|
||
],
|
||
"non-transferable-buffers.any.html": false,
|
||
"non-transferable-buffers.any.worker.html": false,
|
||
"enqueue-with-detached-buffer.window.html": false,
|
||
"tee.any.html": [
|
||
"ReadableStream teeing with byte source: should be able to read one branch to the end without affecting the other",
|
||
"ReadableStream teeing with byte source: chunks should be cloned for each branch",
|
||
"ReadableStream teeing with byte source: chunks for BYOB requests from branch 1 should be cloned to branch 2",
|
||
"ReadableStream teeing with byte source: errors in the source should propagate to both branches",
|
||
"ReadableStream teeing with byte source: closing the original should close the branches",
|
||
"ReadableStream teeing with byte source: erroring the original should immediately error the branches",
|
||
"ReadableStream teeing with byte source: erroring the original should error pending reads from BYOB reader",
|
||
"ReadableStream teeing with byte source: canceling branch1 should finish when branch2 reads until end of stream",
|
||
"ReadableStream teeing with byte source: canceling branch1 should finish when original stream errors",
|
||
"ReadableStream teeing with byte source: should not pull any chunks if no branches are reading",
|
||
"ReadableStream teeing with byte source: should only pull enough to fill the emptiest queue",
|
||
"ReadableStream teeing with byte source: should not pull when original is already errored",
|
||
"ReadableStream teeing with byte source: stops pulling when original stream errors while branch 1 is reading",
|
||
"ReadableStream teeing with byte source: stops pulling when original stream errors while branch 2 is reading",
|
||
"ReadableStream teeing with byte source: stops pulling when original stream errors while both branches are reading",
|
||
"ReadableStream teeing with byte source: canceling both branches in sequence with delay",
|
||
"ReadableStream teeing with byte source: failing to cancel when canceling both branches in sequence with delay",
|
||
"ReadableStream teeing with byte source: read from branch1 and branch2, cancel branch1, cancel branch2",
|
||
"ReadableStream teeing with byte source: read from branch1 and branch2, cancel branch2, cancel branch1",
|
||
"ReadableStream teeing with byte source: read from branch1 and branch2, cancel branch2, enqueue to branch1",
|
||
"ReadableStream teeing with byte source: read from branch1 and branch2, cancel branch1, respond to branch2",
|
||
"ReadableStream teeing with byte source: pull with BYOB reader, then pull with default reader",
|
||
"ReadableStream teeing with byte source: pull with default reader, then pull with BYOB reader",
|
||
"ReadableStream teeing with byte source: read from branch2, then read from branch1",
|
||
"ReadableStream teeing with byte source: read from branch1 with default reader, then close while branch2 has pending BYOB read",
|
||
"ReadableStream teeing with byte source: read from branch2 with default reader, then close while branch1 has pending BYOB read",
|
||
"ReadableStream teeing with byte source: close when both branches have pending BYOB reads"
|
||
],
|
||
"tee.any.worker.html": [
|
||
"ReadableStream teeing with byte source: should be able to read one branch to the end without affecting the other",
|
||
"ReadableStream teeing with byte source: chunks should be cloned for each branch",
|
||
"ReadableStream teeing with byte source: chunks for BYOB requests from branch 1 should be cloned to branch 2",
|
||
"ReadableStream teeing with byte source: errors in the source should propagate to both branches",
|
||
"ReadableStream teeing with byte source: closing the original should close the branches",
|
||
"ReadableStream teeing with byte source: erroring the original should immediately error the branches",
|
||
"ReadableStream teeing with byte source: erroring the original should error pending reads from BYOB reader",
|
||
"ReadableStream teeing with byte source: canceling branch1 should finish when branch2 reads until end of stream",
|
||
"ReadableStream teeing with byte source: canceling branch1 should finish when original stream errors",
|
||
"ReadableStream teeing with byte source: should not pull any chunks if no branches are reading",
|
||
"ReadableStream teeing with byte source: should only pull enough to fill the emptiest queue",
|
||
"ReadableStream teeing with byte source: should not pull when original is already errored",
|
||
"ReadableStream teeing with byte source: stops pulling when original stream errors while branch 1 is reading",
|
||
"ReadableStream teeing with byte source: stops pulling when original stream errors while branch 2 is reading",
|
||
"ReadableStream teeing with byte source: stops pulling when original stream errors while both branches are reading",
|
||
"ReadableStream teeing with byte source: canceling both branches in sequence with delay",
|
||
"ReadableStream teeing with byte source: failing to cancel when canceling both branches in sequence with delay",
|
||
"ReadableStream teeing with byte source: read from branch1 and branch2, cancel branch1, cancel branch2",
|
||
"ReadableStream teeing with byte source: read from branch1 and branch2, cancel branch2, cancel branch1",
|
||
"ReadableStream teeing with byte source: read from branch1 and branch2, cancel branch2, enqueue to branch1",
|
||
"ReadableStream teeing with byte source: read from branch1 and branch2, cancel branch1, respond to branch2",
|
||
"ReadableStream teeing with byte source: pull with BYOB reader, then pull with default reader",
|
||
"ReadableStream teeing with byte source: pull with default reader, then pull with BYOB reader",
|
||
"ReadableStream teeing with byte source: read from branch2, then read from branch1",
|
||
"ReadableStream teeing with byte source: read from branch1 with default reader, then close while branch2 has pending BYOB read",
|
||
"ReadableStream teeing with byte source: read from branch2 with default reader, then close while branch1 has pending BYOB read",
|
||
"ReadableStream teeing with byte source: close when both branches have pending BYOB reads"
|
||
]
|
||
},
|
||
"readable-streams": {
|
||
"async-iterator.any.html": false,
|
||
"bad-strategies.any.html": true,
|
||
"bad-strategies.any.worker.html": true,
|
||
"bad-underlying-sources.any.html": true,
|
||
"bad-underlying-sources.any.worker.html": true,
|
||
"cancel.any.html": true,
|
||
"cancel.any.worker.html": true,
|
||
"constructor.any.html": true,
|
||
"constructor.any.worker.html": true,
|
||
"count-queuing-strategy-integration.any.html": true,
|
||
"count-queuing-strategy-integration.any.worker.html": true,
|
||
"default-reader.any.html": true,
|
||
"default-reader.any.worker.html": true,
|
||
"floating-point-total-queue-size.any.html": true,
|
||
"floating-point-total-queue-size.any.worker.html": true,
|
||
"garbage-collection.any.html": true,
|
||
"garbage-collection.any.worker.html": true,
|
||
"general.any.html": true,
|
||
"general.any.worker.html": true,
|
||
"patched-global.any.html": true,
|
||
"patched-global.any.worker.html": true,
|
||
"reentrant-strategies.any.html": true,
|
||
"reentrant-strategies.any.worker.html": true,
|
||
"tee.any.html": false,
|
||
"tee.any.worker.html": false,
|
||
"templated.any.html": true,
|
||
"templated.any.worker.html": true
|
||
},
|
||
"transform-streams": {
|
||
"backpressure.any.html": true,
|
||
"backpressure.any.worker.html": true,
|
||
"errors.any.html": true,
|
||
"errors.any.worker.html": true,
|
||
"flush.any.html": true,
|
||
"flush.any.worker.html": true,
|
||
"general.any.html": true,
|
||
"general.any.worker.html": true,
|
||
"lipfuzz.any.html": true,
|
||
"lipfuzz.any.worker.html": true,
|
||
"patched-global.any.html": true,
|
||
"patched-global.any.worker.html": true,
|
||
"properties.any.html": true,
|
||
"properties.any.worker.html": true,
|
||
"reentrant-strategies.any.html": true,
|
||
"reentrant-strategies.any.worker.html": true,
|
||
"strategies.any.html": true,
|
||
"strategies.any.worker.html": true,
|
||
"terminate.any.html": true,
|
||
"terminate.any.worker.html": true
|
||
},
|
||
"writable-streams": {
|
||
"aborting.any.html": [
|
||
"WritableStreamDefaultController.signal",
|
||
"the abort signal is signalled synchronously - write",
|
||
"the abort signal is signalled synchronously - close",
|
||
"the abort signal is not signalled on error",
|
||
"the abort signal is not signalled on write failure",
|
||
"the abort signal is not signalled on close failure",
|
||
"recursive abort() call"
|
||
],
|
||
"aborting.any.worker.html": [
|
||
"WritableStreamDefaultController.signal",
|
||
"the abort signal is signalled synchronously - write",
|
||
"the abort signal is signalled synchronously - close",
|
||
"the abort signal is not signalled on error",
|
||
"the abort signal is not signalled on write failure",
|
||
"the abort signal is not signalled on close failure",
|
||
"recursive abort() call"
|
||
],
|
||
"bad-strategies.any.html": true,
|
||
"bad-strategies.any.worker.html": true,
|
||
"bad-underlying-sinks.any.html": true,
|
||
"bad-underlying-sinks.any.worker.html": true,
|
||
"byte-length-queuing-strategy.any.html": true,
|
||
"byte-length-queuing-strategy.any.worker.html": true,
|
||
"close.any.html": [
|
||
"when close is called on a WritableStream in waiting state, ready should be fulfilled immediately even if close takes a long time"
|
||
],
|
||
"close.any.worker.html": [
|
||
"when close is called on a WritableStream in waiting state, ready should be fulfilled immediately even if close takes a long time"
|
||
],
|
||
"constructor.any.html": true,
|
||
"constructor.any.worker.html": true,
|
||
"count-queuing-strategy.any.html": true,
|
||
"count-queuing-strategy.any.worker.html": true,
|
||
"error.any.html": true,
|
||
"error.any.worker.html": true,
|
||
"floating-point-total-queue-size.any.html": true,
|
||
"floating-point-total-queue-size.any.worker.html": true,
|
||
"general.any.html": true,
|
||
"general.any.worker.html": true,
|
||
"properties.any.html": true,
|
||
"properties.any.worker.html": true,
|
||
"reentrant-strategy.any.html": true,
|
||
"reentrant-strategy.any.worker.html": true,
|
||
"start.any.html": true,
|
||
"start.any.worker.html": true,
|
||
"write.any.html": true,
|
||
"write.any.worker.html": true
|
||
},
|
||
"queuing-strategies-size-function-per-global.window.html": false,
|
||
"transferable": {
|
||
"deserialize-error.window.html": false
|
||
}
|
||
},
|
||
"user-timing": {
|
||
"buffered-flag.any.html": false,
|
||
"buffered-flag.any.worker.html": false,
|
||
"case-sensitivity.any.html": false,
|
||
"case-sensitivity.any.worker.html": false,
|
||
"clear_all_marks.any.html": true,
|
||
"clear_all_marks.any.worker.html": true,
|
||
"clear_all_measures.any.html": true,
|
||
"clear_all_measures.any.worker.html": true,
|
||
"clear_non_existent_mark.any.html": true,
|
||
"clear_non_existent_mark.any.worker.html": true,
|
||
"clear_non_existent_measure.any.html": true,
|
||
"clear_non_existent_measure.any.worker.html": true,
|
||
"clear_one_mark.any.html": true,
|
||
"clear_one_mark.any.worker.html": true,
|
||
"clear_one_measure.any.html": true,
|
||
"clear_one_measure.any.worker.html": true,
|
||
"entry_type.any.html": true,
|
||
"entry_type.any.worker.html": true,
|
||
"idlharness.any.html": true,
|
||
"idlharness.any.worker.html": true,
|
||
"mark-entry-constructor.any.html": true,
|
||
"mark-entry-constructor.any.worker.html": true,
|
||
"mark-errors.any.html": true,
|
||
"mark-errors.any.worker.html": true,
|
||
"mark-l3.any.html": false,
|
||
"mark-l3.any.worker.html": false,
|
||
"mark-measure-return-objects.any.html": true,
|
||
"mark-measure-return-objects.any.worker.html": true,
|
||
"mark.any.html": true,
|
||
"mark.any.worker.html": true,
|
||
"measure-l3.any.html": true,
|
||
"measure-l3.any.worker.html": true,
|
||
"measure-with-dict.any.html": [
|
||
"measure entries' detail and start/end are customizable"
|
||
],
|
||
"measure-with-dict.any.worker.html": [
|
||
"measure entries' detail and start/end are customizable"
|
||
],
|
||
"measure_syntax_err.any.html": true,
|
||
"measure_syntax_err.any.worker.html": true,
|
||
"structured-serialize-detail.any.html": true,
|
||
"structured-serialize-detail.any.worker.html": true,
|
||
"supported-usertiming-types.any.html": false,
|
||
"supported-usertiming-types.any.worker.html": false,
|
||
"user_timing_exists.any.html": true,
|
||
"user_timing_exists.any.worker.html": true,
|
||
"invoke_with_timing_attributes.worker.html": true,
|
||
"performance-measure-invalid.worker.html": false
|
||
},
|
||
"wasm": {
|
||
"jsapi": {
|
||
"constructor": {
|
||
"compile.any.html": true,
|
||
"compile.any.worker.html": true,
|
||
"instantiate-bad-imports.any.html": true,
|
||
"instantiate-bad-imports.any.worker.html": true,
|
||
"instantiate.any.html": [
|
||
"Synchronous options handling: Buffer argument"
|
||
],
|
||
"instantiate.any.worker.html": [
|
||
"Synchronous options handling: Buffer argument"
|
||
],
|
||
"multi-value.any.html": true,
|
||
"multi-value.any.worker.html": true,
|
||
"toStringTag.any.html": true,
|
||
"toStringTag.any.worker.html": true,
|
||
"validate.any.html": true,
|
||
"validate.any.worker.html": true
|
||
},
|
||
"global": {
|
||
"constructor.any.html": true,
|
||
"constructor.any.worker.html": true,
|
||
"toString.any.html": true,
|
||
"toString.any.worker.html": true,
|
||
"type.tentative.any.html": false,
|
||
"type.tentative.any.worker.html": false,
|
||
"value-get-set.any.html": true,
|
||
"value-get-set.any.worker.html": true,
|
||
"valueOf.any.html": true,
|
||
"valueOf.any.worker.html": true
|
||
},
|
||
"idlharness.any.html": [
|
||
"Table interface: operation set(unsigned long, optional any)"
|
||
],
|
||
"idlharness.any.worker.html": [
|
||
"Table interface: operation set(unsigned long, optional any)"
|
||
],
|
||
"instance": {
|
||
"constructor-bad-imports.any.html": true,
|
||
"constructor-bad-imports.any.worker.html": true,
|
||
"constructor-caching.any.html": true,
|
||
"constructor-caching.any.worker.html": true,
|
||
"constructor.any.html": true,
|
||
"constructor.any.worker.html": true,
|
||
"exports.any.html": true,
|
||
"exports.any.worker.html": true,
|
||
"toString.any.html": true,
|
||
"toString.any.worker.html": true
|
||
},
|
||
"interface.any.html": true,
|
||
"interface.any.worker.html": true,
|
||
"memory": {
|
||
"buffer.any.html": true,
|
||
"buffer.any.worker.html": true,
|
||
"constructor.any.html": true,
|
||
"constructor.any.worker.html": true,
|
||
"grow.any.html": true,
|
||
"grow.any.worker.html": true,
|
||
"toString.any.html": true,
|
||
"toString.any.worker.html": true,
|
||
"type.tentative.any.html": false,
|
||
"type.tentative.any.worker.html": false,
|
||
"constructor-shared.tentative.any.html": true,
|
||
"constructor-shared.tentative.any.worker.html": true,
|
||
"constructor-types.tentative.any.html": false,
|
||
"constructor-types.tentative.any.worker.html": false
|
||
},
|
||
"module": {
|
||
"constructor.any.html": true,
|
||
"constructor.any.worker.html": true,
|
||
"customSections.any.html": true,
|
||
"customSections.any.worker.html": true,
|
||
"exports.any.html": true,
|
||
"exports.any.worker.html": true,
|
||
"imports.any.html": true,
|
||
"imports.any.worker.html": true,
|
||
"toString.any.html": true,
|
||
"toString.any.worker.html": true
|
||
},
|
||
"prototypes.any.html": false,
|
||
"prototypes.any.worker.html": false,
|
||
"table": {
|
||
"constructor.any.html": [
|
||
"initialize externref table with default value"
|
||
],
|
||
"constructor.any.worker.html": [
|
||
"initialize externref table with default value"
|
||
],
|
||
"get-set.any.html": [
|
||
"Arguments for anyfunc table set",
|
||
"Arguments for externref table set"
|
||
],
|
||
"get-set.any.worker.html": [
|
||
"Arguments for anyfunc table set",
|
||
"Arguments for externref table set"
|
||
],
|
||
"grow.any.html": [
|
||
"Grow with exported-function argument",
|
||
"Grow with non-function argument",
|
||
"Grow with JS-function argument"
|
||
],
|
||
"grow.any.worker.html": [
|
||
"Grow with exported-function argument",
|
||
"Grow with non-function argument",
|
||
"Grow with JS-function argument"
|
||
],
|
||
"length.any.html": true,
|
||
"length.any.worker.html": true,
|
||
"toString.any.html": true,
|
||
"toString.any.worker.html": true,
|
||
"constructor-types.tentative.any.html": false,
|
||
"constructor-types.tentative.any.worker.html": false,
|
||
"type.tentative.any.html": false,
|
||
"type.tentative.any.worker.html": false
|
||
},
|
||
"exception": {
|
||
"basic.tentative.any.html": [
|
||
"Wasm function throws argument",
|
||
"Wasm function throws null",
|
||
"Imported JS function throws",
|
||
"Imported JS function throws, Wasm catches and rethrows"
|
||
],
|
||
"basic.tentative.any.worker.html": [
|
||
"Wasm function throws argument",
|
||
"Wasm function throws null",
|
||
"Imported JS function throws",
|
||
"Imported JS function throws, Wasm catches and rethrows"
|
||
],
|
||
"constructor.tentative.any.html": true,
|
||
"constructor.tentative.any.worker.html": true,
|
||
"getArg.tentative.any.html": true,
|
||
"getArg.tentative.any.worker.html": true,
|
||
"is.tentative.any.html": true,
|
||
"is.tentative.any.worker.html": true,
|
||
"toString.tentative.any.html": false,
|
||
"toString.tentative.any.worker.html": false,
|
||
"type.tentative.any.html": false,
|
||
"type.tentative.any.worker.html": false
|
||
},
|
||
"tag": {
|
||
"constructor.tentative.any.html": true,
|
||
"constructor.tentative.any.worker.html": true,
|
||
"toString.tentative.any.html": true,
|
||
"toString.tentative.any.worker.html": true,
|
||
"type.tentative.any.html": false,
|
||
"type.tentative.any.worker.html": false
|
||
},
|
||
"function": {
|
||
"call.tentative.any.html": false,
|
||
"call.tentative.any.worker.html": false,
|
||
"constructor.tentative.any.html": [
|
||
"name",
|
||
"length",
|
||
"Too few arguments",
|
||
"Calling",
|
||
"construct with JS function",
|
||
"fail with missing results",
|
||
"fail with missing parameters",
|
||
"fail with non-string parameters & results",
|
||
"fail with non-existent parameter and result type",
|
||
"fail with non-function object",
|
||
"fail to construct with non-callable object"
|
||
],
|
||
"constructor.tentative.any.worker.html": [
|
||
"name",
|
||
"length",
|
||
"Too few arguments",
|
||
"Calling",
|
||
"construct with JS function",
|
||
"fail with missing results",
|
||
"fail with missing parameters",
|
||
"fail with non-string parameters & results",
|
||
"fail with non-existent parameter and result type",
|
||
"fail with non-function object",
|
||
"fail to construct with non-callable object"
|
||
],
|
||
"table.tentative.any.html": false,
|
||
"table.tentative.any.worker.html": false,
|
||
"type.tentative.any.html": false,
|
||
"type.tentative.any.worker.html": false
|
||
}
|
||
},
|
||
"serialization": {
|
||
"module": {
|
||
"serialization-via-idb.any.html": false,
|
||
"serialization-via-idb.any.worker.html": false,
|
||
"serialization-via-notifications-api.any.html": false,
|
||
"serialization-via-notifications-api.any.worker.html": false,
|
||
"nested-worker-success.any.worker.html": true
|
||
},
|
||
"arraybuffer": {
|
||
"transfer.window.html": false
|
||
}
|
||
},
|
||
"webapi": {
|
||
"abort.any.html": true,
|
||
"abort.any.worker.html": true,
|
||
"body.any.html": true,
|
||
"body.any.worker.html": true,
|
||
"contenttype.any.html": true,
|
||
"contenttype.any.worker.html": true,
|
||
"empty-body.any.html": true,
|
||
"empty-body.any.worker.html": true,
|
||
"historical.any.html": false,
|
||
"historical.any.worker.html": false,
|
||
"idlharness.any.html": true,
|
||
"idlharness.any.worker.html": true,
|
||
"instantiateStreaming-bad-imports.any.html": true,
|
||
"instantiateStreaming-bad-imports.any.worker.html": true,
|
||
"instantiateStreaming.any.html": true,
|
||
"instantiateStreaming.any.worker.html": true,
|
||
"invalid-args.any.html": true,
|
||
"invalid-args.any.worker.html": true,
|
||
"invalid-code.any.html": true,
|
||
"invalid-code.any.worker.html": true,
|
||
"modified-contenttype.any.html": true,
|
||
"modified-contenttype.any.worker.html": true,
|
||
"origin.sub.any.html": [
|
||
"Opaque response: compileStreaming",
|
||
"Opaque response: instantiateStreaming"
|
||
],
|
||
"origin.sub.any.worker.html": [
|
||
"Opaque response: compileStreaming",
|
||
"Opaque response: instantiateStreaming"
|
||
],
|
||
"rejected-arg.any.html": true,
|
||
"rejected-arg.any.worker.html": true,
|
||
"status.any.html": true,
|
||
"status.any.worker.html": true
|
||
},
|
||
"create_multiple_memory.worker.html": true
|
||
},
|
||
"webidl": {
|
||
"ecmascript-binding": {
|
||
"es-exceptions": {
|
||
"DOMException-constants.any.html": true,
|
||
"DOMException-constants.any.worker.html": true,
|
||
"DOMException-constructor-and-prototype.any.html": true,
|
||
"DOMException-constructor-and-prototype.any.worker.html": true,
|
||
"DOMException-constructor-behavior.any.html": true,
|
||
"DOMException-constructor-behavior.any.worker.html": true,
|
||
"DOMException-custom-bindings.any.html": true,
|
||
"DOMException-custom-bindings.any.worker.html": true
|
||
},
|
||
"class-string-interface.any.html": true,
|
||
"class-string-interface.any.worker.html": true,
|
||
"class-string-iterator-prototype-object.any.html": true,
|
||
"class-string-iterator-prototype-object.any.worker.html": true,
|
||
"class-string-named-properties-object.window.html": [
|
||
"@@toStringTag exists with the appropriate descriptor",
|
||
"Object.prototype.toString"
|
||
],
|
||
"global-immutable-prototype.any.html": [
|
||
"Setting to a different prototype"
|
||
],
|
||
"global-immutable-prototype.any.worker.html": [
|
||
"Setting to a different prototype"
|
||
],
|
||
"global-object-implicit-this-value.any.html": [
|
||
"Global object's getter throws when called on incompatible object",
|
||
"Global object's setter throws when called on incompatible object",
|
||
"Global object's operation throws when called on incompatible object",
|
||
"Global object's getter works when called on null / undefined",
|
||
"Global object's setter works when called on null / undefined"
|
||
],
|
||
"global-object-implicit-this-value.any.worker.html": [
|
||
"Global object's getter throws when called on incompatible object",
|
||
"Global object's setter throws when called on incompatible object",
|
||
"Global object's operation throws when called on incompatible object",
|
||
"Global object's getter works when called on null / undefined",
|
||
"Global object's setter works when called on null / undefined"
|
||
],
|
||
"legacy-factor-function-subclass.window.html": false,
|
||
"no-regexp-special-casing.any.html": [
|
||
"Conversion to a sequence works"
|
||
],
|
||
"no-regexp-special-casing.any.worker.html": [
|
||
"Conversion to a sequence works"
|
||
]
|
||
},
|
||
"idlharness.any.html": true,
|
||
"idlharness.any.worker.html": true
|
||
},
|
||
"url": {
|
||
"historical.any.html": [
|
||
"<a> and <area>.searchParams should be undefined"
|
||
],
|
||
"historical.any.worker.html": true,
|
||
"idlharness.any.html": true,
|
||
"idlharness.any.worker.html": true,
|
||
"toascii.window.html": [
|
||
"aa-- (using <a>.host)",
|
||
"aa-- (using <a>.hostname)",
|
||
"aa-- (using <area>.host)",
|
||
"aa-- (using <area>.hostname)",
|
||
"a†-- (using <a>.host)",
|
||
"a†-- (using <a>.hostname)",
|
||
"a†-- (using <area>.host)",
|
||
"a†-- (using <area>.hostname)",
|
||
"ab--c (using <a>.host)",
|
||
"ab--c (using <a>.hostname)",
|
||
"ab--c (using <area>.host)",
|
||
"ab--c (using <area>.hostname)",
|
||
"-x (using <a>.host)",
|
||
"-x (using <a>.hostname)",
|
||
"-x (using <area>.host)",
|
||
"-x (using <area>.hostname)",
|
||
"-† (using <a>.host)",
|
||
"-† (using <a>.hostname)",
|
||
"-† (using <area>.host)",
|
||
"-† (using <area>.hostname)",
|
||
"-x.xn--nxa (using <a>.host)",
|
||
"-x.xn--nxa (using <a>.hostname)",
|
||
"-x.xn--nxa (using <area>.host)",
|
||
"-x.xn--nxa (using <area>.hostname)",
|
||
"-x.β (using <a>.host)",
|
||
"-x.β (using <a>.hostname)",
|
||
"-x.β (using <area>.host)",
|
||
"-x.β (using <area>.hostname)",
|
||
"x-.xn--nxa (using <a>.host)",
|
||
"x-.xn--nxa (using <a>.hostname)",
|
||
"x-.xn--nxa (using <area>.host)",
|
||
"x-.xn--nxa (using <area>.hostname)",
|
||
"x-.β (using <a>.host)",
|
||
"x-.β (using <a>.hostname)",
|
||
"x-.β (using <area>.host)",
|
||
"x-.β (using <area>.hostname)",
|
||
"x..xn--nxa (using <a>.host)",
|
||
"x..xn--nxa (using <a>.hostname)",
|
||
"x..xn--nxa (using <area>.host)",
|
||
"x..xn--nxa (using <area>.hostname)",
|
||
"x..β (using <a>.host)",
|
||
"x..β (using <a>.hostname)",
|
||
"x..β (using <area>.host)",
|
||
"x..β (using <area>.hostname)",
|
||
"xn--a (using <a>)",
|
||
"xn--a (using <a>.host)",
|
||
"xn--a (using <a>.hostname)",
|
||
"xn--a (using <area>)",
|
||
"xn--a (using <area>.host)",
|
||
"xn--a (using <area>.hostname)",
|
||
"xn--a.xn--nxa (using <a>)",
|
||
"xn--a.xn--nxa (using <a>.host)",
|
||
"xn--a.xn--nxa (using <a>.hostname)",
|
||
"xn--a.xn--nxa (using <area>)",
|
||
"xn--a.xn--nxa (using <area>.host)",
|
||
"xn--a.xn--nxa (using <area>.hostname)",
|
||
"xn--a.β (using <a>)",
|
||
"xn--a.β (using <a>.host)",
|
||
"xn--a.β (using <a>.hostname)",
|
||
"xn--a.β (using <area>)",
|
||
"xn--a.β (using <area>.host)",
|
||
"xn--a.β (using <area>.hostname)",
|
||
"xn--nxa.xn--nxa (using <a>.host)",
|
||
"xn--nxa.xn--nxa (using <a>.hostname)",
|
||
"xn--nxa.xn--nxa (using <area>.host)",
|
||
"xn--nxa.xn--nxa (using <area>.hostname)",
|
||
"xn--nxa.β (using <a>.host)",
|
||
"xn--nxa.β (using <a>.hostname)",
|
||
"xn--nxa.β (using <area>.host)",
|
||
"xn--nxa.β (using <area>.hostname)",
|
||
"ab--c.xn--nxa (using <a>.host)",
|
||
"ab--c.xn--nxa (using <a>.hostname)",
|
||
"ab--c.xn--nxa (using <area>.host)",
|
||
"ab--c.xn--nxa (using <area>.hostname)",
|
||
"ab--c.β (using <a>.host)",
|
||
"ab--c.β (using <a>.hostname)",
|
||
"ab--c.β (using <area>.host)",
|
||
"ab--c.β (using <area>.hostname)",
|
||
".example (using URL)",
|
||
".example (using URL.host)",
|
||
".example (using URL.hostname)",
|
||
".example (using <a>)",
|
||
".example (using <a>.host)",
|
||
".example (using <a>.hostname)",
|
||
".example (using <area>)",
|
||
".example (using <area>.host)",
|
||
".example (using <area>.hostname)",
|
||
"xn--1ug.example (using URL)",
|
||
"xn--1ug.example (using URL.host)",
|
||
"xn--1ug.example (using URL.hostname)",
|
||
"xn--1ug.example (using <a>)",
|
||
"xn--1ug.example (using <a>.host)",
|
||
"xn--1ug.example (using <a>.hostname)",
|
||
"xn--1ug.example (using <area>)",
|
||
"xn--1ug.example (using <area>.host)",
|
||
"xn--1ug.example (using <area>.hostname)",
|
||
"يa (using <a>)",
|
||
"يa (using <a>.host)",
|
||
"يa (using <a>.hostname)",
|
||
"يa (using <area>)",
|
||
"يa (using <area>.host)",
|
||
"يa (using <area>.hostname)",
|
||
"xn--a-yoc (using <a>)",
|
||
"xn--a-yoc (using <a>.host)",
|
||
"xn--a-yoc (using <a>.hostname)",
|
||
"xn--a-yoc (using <area>)",
|
||
"xn--a-yoc (using <area>.host)",
|
||
"xn--a-yoc (using <area>.hostname)",
|
||
"ශ්රී (using <a>.host)",
|
||
"ශ්රී (using <a>.hostname)",
|
||
"ශ්රී (using <area>.host)",
|
||
"ශ්රී (using <area>.hostname)",
|
||
"نامهای (using <a>.host)",
|
||
"نامهای (using <a>.hostname)",
|
||
"نامهای (using <area>.host)",
|
||
"نامهای (using <area>.hostname)",
|
||
"<22>.com (using <a>)",
|
||
"<22>.com (using <a>.host)",
|
||
"<22>.com (using <a>.hostname)",
|
||
"<22>.com (using <area>)",
|
||
"<22>.com (using <area>.host)",
|
||
"<22>.com (using <area>.hostname)",
|
||
"xn--zn7c.com (using <a>)",
|
||
"xn--zn7c.com (using <a>.host)",
|
||
"xn--zn7c.com (using <a>.hostname)",
|
||
"xn--zn7c.com (using <area>)",
|
||
"xn--zn7c.com (using <area>.host)",
|
||
"xn--zn7c.com (using <area>.hostname)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x (using <a>.host)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x (using <a>.hostname)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x (using <area>.host)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x (using <area>.hostname)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901† (using <a>.host)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901† (using <a>.hostname)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901† (using <area>.host)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901† (using <area>.hostname)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x.xn--nxa (using <a>.host)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x.xn--nxa (using <a>.hostname)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x.xn--nxa (using <area>.host)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x.xn--nxa (using <area>.hostname)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x.β (using <a>.host)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x.β (using <a>.hostname)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x.β (using <area>.host)",
|
||
"x01234567890123456789012345678901234567890123456789012345678901x.β (using <area>.hostname)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.x (using <a>.host)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.x (using <a>.hostname)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.x (using <area>.host)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.x (using <area>.hostname)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.xn--nxa (using <a>.host)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.xn--nxa (using <a>.hostname)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.xn--nxa (using <area>.host)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.xn--nxa (using <area>.hostname)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.β (using <a>.host)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.β (using <a>.hostname)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.β (using <area>.host)",
|
||
"01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.0123456789012345678901234567890123456789012345678.β (using <area>.hostname)",
|
||
"ab (using <a>.host)",
|
||
"ab (using <a>.hostname)",
|
||
"ab (using <area>.host)",
|
||
"ab (using <area>.hostname)",
|
||
"a%C2%ADb (using <a>.host)",
|
||
"a%C2%ADb (using <a>.hostname)",
|
||
"a%C2%ADb (using <area>.host)",
|
||
"a%C2%ADb (using <area>.hostname)",
|
||
" (using <a>)",
|
||
" (using <a>.host)",
|
||
" (using <a>.hostname)",
|
||
" (using <area>)",
|
||
" (using <area>.host)",
|
||
" (using <area>.hostname)",
|
||
"%C2%AD (using <a>)",
|
||
"%C2%AD (using <a>.host)",
|
||
"%C2%AD (using <a>.hostname)",
|
||
"%C2%AD (using <area>)",
|
||
"%C2%AD (using <area>.host)",
|
||
"%C2%AD (using <area>.hostname)",
|
||
"xn-- (using <a>)",
|
||
"xn-- (using <a>.host)",
|
||
"xn-- (using <a>.hostname)",
|
||
"xn-- (using <area>)",
|
||
"xn-- (using <area>.host)",
|
||
"xn-- (using <area>.hostname)"
|
||
],
|
||
"url-constructor.any.html": [
|
||
"Parsing: <foo://ho|st/> against <about:blank>",
|
||
"Parsing: <http://ho%7Cst/> against <about:blank>",
|
||
"Parsing: <file://%43%7C> against <about:blank>",
|
||
"Parsing: <file://%43|> against <about:blank>",
|
||
"Parsing: <file://C%7C> against <about:blank>",
|
||
"Parsing: <file://%43%7C/> against <about:blank>",
|
||
"Parsing: <https://%43%7C/> against <about:blank>",
|
||
"Parsing: <asdf://%43|/> against <about:blank>",
|
||
"Parsing: </> against <file://h/C:/a/b>",
|
||
"Parsing: <file:\\\\//> against <about:blank>",
|
||
"Parsing: <file:\\\\\\\\> against <about:blank>",
|
||
"Parsing: <file:\\\\\\\\?fox> against <about:blank>",
|
||
"Parsing: <file:\\\\\\\\#guppy> against <about:blank>",
|
||
"Parsing: <file://spider///> against <about:blank>",
|
||
"Parsing: <file:\\\\localhost//> against <about:blank>",
|
||
"Parsing: <file://\\/localhost//cat> against <about:blank>",
|
||
"Parsing: <file://localhost//a//../..//> against <about:blank>",
|
||
"Parsing: </////mouse> against <file:///elephant>",
|
||
"Parsing: <\\/localhost//pig> against <file://lion/>",
|
||
"Parsing: <//localhost//pig> against <file://lion/>",
|
||
"Parsing: </..//localhost//pig> against <file://lion/>",
|
||
"Parsing: <C|> against <file://host/dir/file>",
|
||
"Parsing: <C|> against <file://host/D:/dir1/dir2/file>",
|
||
"Parsing: <C|#> against <file://host/dir/file>",
|
||
"Parsing: <C|?> against <file://host/dir/file>",
|
||
"Parsing: <C|/> against <file://host/dir/file>",
|
||
"Parsing: <C|\n/> against <file://host/dir/file>",
|
||
"Parsing: <C|\\> against <file://host/dir/file>",
|
||
"Parsing: </c:/foo/bar> against <file://host/path>",
|
||
"Parsing: <file://example.net/C:/> against <about:blank>",
|
||
"Parsing: <file://1.2.3.4/C:/> against <about:blank>",
|
||
"Parsing: <file://[1::8]/C:/> against <about:blank>",
|
||
"Parsing: <C|/> against <file://host/>",
|
||
"Parsing: </C:/> against <file://host/>",
|
||
"Parsing: <file:C:/> against <file://host/>",
|
||
"Parsing: <file:/C:/> against <file://host/>",
|
||
"Parsing: <file://localhost//a//../..//foo> against <about:blank>",
|
||
"Parsing: <file://localhost////foo> against <about:blank>",
|
||
"Parsing: <file:////foo> against <about:blank>",
|
||
"Parsing: <file:////one/two> against <file:///>",
|
||
"Parsing: <////one/two> against <file:///>",
|
||
"Parsing: <file:///.//> against <file:////>",
|
||
"Parsing: <file:.//p> against <about:blank>",
|
||
"Parsing: <file:/.//p> against <about:blank>",
|
||
"Parsing: <non-spec:/.//> against <about:blank>",
|
||
"Parsing: <non-spec:/..//> against <about:blank>",
|
||
"Parsing: <non-spec:/a/..//> against <about:blank>",
|
||
"Parsing: <non-spec:/.//path> against <about:blank>",
|
||
"Parsing: <non-spec:/..//path> against <about:blank>",
|
||
"Parsing: <non-spec:/a/..//path> against <about:blank>",
|
||
"Parsing: </.//path> against <non-spec:/p>",
|
||
"Parsing: </..//path> against <non-spec:/p>",
|
||
"Parsing: <..//path> against <non-spec:/p>",
|
||
"Parsing: <a/..//path> against <non-spec:/p>",
|
||
"Parsing: <> against <non-spec:/..//p>",
|
||
"Parsing: <path> against <non-spec:/..//p>",
|
||
"Parsing: <http://1.2.3.4.5> against <http://other.com/>",
|
||
"Parsing: <http://1.2.3.4.5.> against <http://other.com/>",
|
||
"Parsing: <http://0..0x300/> against <about:blank>",
|
||
"Parsing: <http://0..0x300./> against <about:blank>",
|
||
"Parsing: <http://256.256.256.256.256> against <http://other.com/>",
|
||
"Parsing: <http://256.256.256.256.256.> against <http://other.com/>",
|
||
"Parsing: <http://1.2.3.08> against <about:blank>",
|
||
"Parsing: <http://1.2.3.08.> against <about:blank>",
|
||
"Parsing: <http://1.2.3.09> against <about:blank>",
|
||
"Parsing: <http://09.2.3.4> against <about:blank>",
|
||
"Parsing: <http://09.2.3.4.> against <about:blank>",
|
||
"Parsing: <http://01.2.3.4.5> against <about:blank>",
|
||
"Parsing: <http://01.2.3.4.5.> against <about:blank>",
|
||
"Parsing: <http://0x1.2.3.4.5> against <about:blank>",
|
||
"Parsing: <http://0x1.2.3.4.5.> against <about:blank>",
|
||
"Parsing: <http://foo.1.2.3.4> against <about:blank>",
|
||
"Parsing: <http://foo.1.2.3.4.> against <about:blank>",
|
||
"Parsing: <http://foo.2.3.4> against <about:blank>",
|
||
"Parsing: <http://foo.2.3.4.> against <about:blank>",
|
||
"Parsing: <http://foo.09> against <about:blank>",
|
||
"Parsing: <http://foo.09.> against <about:blank>",
|
||
"Parsing: <http://foo.0x4> against <about:blank>",
|
||
"Parsing: <http://foo.0x4.> against <about:blank>",
|
||
"Parsing: <http://0999999999999999999/> against <about:blank>",
|
||
"Parsing: <http://foo.0x> against <about:blank>",
|
||
"Parsing: <http://foo.0XFfFfFfFfFfFfFfFfFfAcE123> against <about:blank>",
|
||
"Parsing: <http://💩.123/> against <about:blank>"
|
||
],
|
||
"url-constructor.any.worker.html": [
|
||
"Parsing: <foo://ho|st/> against <about:blank>",
|
||
"Parsing: <http://ho%7Cst/> against <about:blank>",
|
||
"Parsing: <file://%43%7C> against <about:blank>",
|
||
"Parsing: <file://%43|> against <about:blank>",
|
||
"Parsing: <file://C%7C> against <about:blank>",
|
||
"Parsing: <file://%43%7C/> against <about:blank>",
|
||
"Parsing: <https://%43%7C/> against <about:blank>",
|
||
"Parsing: <asdf://%43|/> against <about:blank>",
|
||
"Parsing: </> against <file://h/C:/a/b>",
|
||
"Parsing: <file:\\\\//> against <about:blank>",
|
||
"Parsing: <file:\\\\\\\\> against <about:blank>",
|
||
"Parsing: <file:\\\\\\\\?fox> against <about:blank>",
|
||
"Parsing: <file:\\\\\\\\#guppy> against <about:blank>",
|
||
"Parsing: <file://spider///> against <about:blank>",
|
||
"Parsing: <file:\\\\localhost//> against <about:blank>",
|
||
"Parsing: <file://\\/localhost//cat> against <about:blank>",
|
||
"Parsing: <file://localhost//a//../..//> against <about:blank>",
|
||
"Parsing: </////mouse> against <file:///elephant>",
|
||
"Parsing: <\\/localhost//pig> against <file://lion/>",
|
||
"Parsing: <//localhost//pig> against <file://lion/>",
|
||
"Parsing: </..//localhost//pig> against <file://lion/>",
|
||
"Parsing: <C|> against <file://host/dir/file>",
|
||
"Parsing: <C|> against <file://host/D:/dir1/dir2/file>",
|
||
"Parsing: <C|#> against <file://host/dir/file>",
|
||
"Parsing: <C|?> against <file://host/dir/file>",
|
||
"Parsing: <C|/> against <file://host/dir/file>",
|
||
"Parsing: <C|\n/> against <file://host/dir/file>",
|
||
"Parsing: <C|\\> against <file://host/dir/file>",
|
||
"Parsing: </c:/foo/bar> against <file://host/path>",
|
||
"Parsing: <file://example.net/C:/> against <about:blank>",
|
||
"Parsing: <file://1.2.3.4/C:/> against <about:blank>",
|
||
"Parsing: <file://[1::8]/C:/> against <about:blank>",
|
||
"Parsing: <C|/> against <file://host/>",
|
||
"Parsing: </C:/> against <file://host/>",
|
||
"Parsing: <file:C:/> against <file://host/>",
|
||
"Parsing: <file:/C:/> against <file://host/>",
|
||
"Parsing: <file://localhost//a//../..//foo> against <about:blank>",
|
||
"Parsing: <file://localhost////foo> against <about:blank>",
|
||
"Parsing: <file:////foo> against <about:blank>",
|
||
"Parsing: <file:////one/two> against <file:///>",
|
||
"Parsing: <////one/two> against <file:///>",
|
||
"Parsing: <file:///.//> against <file:////>",
|
||
"Parsing: <file:.//p> against <about:blank>",
|
||
"Parsing: <file:/.//p> against <about:blank>",
|
||
"Parsing: <non-spec:/.//> against <about:blank>",
|
||
"Parsing: <non-spec:/..//> against <about:blank>",
|
||
"Parsing: <non-spec:/a/..//> against <about:blank>",
|
||
"Parsing: <non-spec:/.//path> against <about:blank>",
|
||
"Parsing: <non-spec:/..//path> against <about:blank>",
|
||
"Parsing: <non-spec:/a/..//path> against <about:blank>",
|
||
"Parsing: </.//path> against <non-spec:/p>",
|
||
"Parsing: </..//path> against <non-spec:/p>",
|
||
"Parsing: <..//path> against <non-spec:/p>",
|
||
"Parsing: <a/..//path> against <non-spec:/p>",
|
||
"Parsing: <> against <non-spec:/..//p>",
|
||
"Parsing: <path> against <non-spec:/..//p>",
|
||
"Parsing: <http://1.2.3.4.5> against <http://other.com/>",
|
||
"Parsing: <http://1.2.3.4.5.> against <http://other.com/>",
|
||
"Parsing: <http://0..0x300/> against <about:blank>",
|
||
"Parsing: <http://0..0x300./> against <about:blank>",
|
||
"Parsing: <http://256.256.256.256.256> against <http://other.com/>",
|
||
"Parsing: <http://256.256.256.256.256.> against <http://other.com/>",
|
||
"Parsing: <http://1.2.3.08> against <about:blank>",
|
||
"Parsing: <http://1.2.3.08.> against <about:blank>",
|
||
"Parsing: <http://1.2.3.09> against <about:blank>",
|
||
"Parsing: <http://09.2.3.4> against <about:blank>",
|
||
"Parsing: <http://09.2.3.4.> against <about:blank>",
|
||
"Parsing: <http://01.2.3.4.5> against <about:blank>",
|
||
"Parsing: <http://01.2.3.4.5.> against <about:blank>",
|
||
"Parsing: <http://0x1.2.3.4.5> against <about:blank>",
|
||
"Parsing: <http://0x1.2.3.4.5.> against <about:blank>",
|
||
"Parsing: <http://foo.1.2.3.4> against <about:blank>",
|
||
"Parsing: <http://foo.1.2.3.4.> against <about:blank>",
|
||
"Parsing: <http://foo.2.3.4> against <about:blank>",
|
||
"Parsing: <http://foo.2.3.4.> against <about:blank>",
|
||
"Parsing: <http://foo.09> against <about:blank>",
|
||
"Parsing: <http://foo.09.> against <about:blank>",
|
||
"Parsing: <http://foo.0x4> against <about:blank>",
|
||
"Parsing: <http://foo.0x4.> against <about:blank>",
|
||
"Parsing: <http://0999999999999999999/> against <about:blank>",
|
||
"Parsing: <http://foo.0x> against <about:blank>",
|
||
"Parsing: <http://foo.0XFfFfFfFfFfFfFfFfFfAcE123> against <about:blank>",
|
||
"Parsing: <http://💩.123/> against <about:blank>"
|
||
],
|
||
"url-origin.any.html": true,
|
||
"url-origin.any.worker.html": true,
|
||
"url-searchparams.any.html": true,
|
||
"url-searchparams.any.worker.html": true,
|
||
"url-setters-stripping.any.html": [
|
||
"Setting protocol with leading U+0000 (https:)",
|
||
"Setting protocol with U+0000 before inserted colon (https:)",
|
||
"Setting port with leading U+0000 (https:)",
|
||
"Setting pathname with trailing U+0000 (https:)",
|
||
"Setting protocol with leading U+001F (https:)",
|
||
"Setting protocol with U+001F before inserted colon (https:)",
|
||
"Setting port with leading U+001F (https:)",
|
||
"Setting pathname with trailing U+001F (https:)",
|
||
"Setting protocol with leading U+0000 (wpt++:)",
|
||
"Setting protocol with U+0000 before inserted colon (wpt++:)",
|
||
"Setting port with leading U+0000 (wpt++:)",
|
||
"Setting pathname with trailing U+0000 (wpt++:)",
|
||
"Setting protocol with leading U+001F (wpt++:)",
|
||
"Setting protocol with U+001F before inserted colon (wpt++:)",
|
||
"Setting port with leading U+001F (wpt++:)",
|
||
"Setting pathname with trailing U+001F (wpt++:)"
|
||
],
|
||
"url-setters-stripping.any.worker.html": [
|
||
"Setting protocol with leading U+0000 (https:)",
|
||
"Setting protocol with U+0000 before inserted colon (https:)",
|
||
"Setting port with leading U+0000 (https:)",
|
||
"Setting pathname with trailing U+0000 (https:)",
|
||
"Setting protocol with leading U+001F (https:)",
|
||
"Setting protocol with U+001F before inserted colon (https:)",
|
||
"Setting port with leading U+001F (https:)",
|
||
"Setting pathname with trailing U+001F (https:)",
|
||
"Setting protocol with leading U+0000 (wpt++:)",
|
||
"Setting protocol with U+0000 before inserted colon (wpt++:)",
|
||
"Setting port with leading U+0000 (wpt++:)",
|
||
"Setting pathname with trailing U+0000 (wpt++:)",
|
||
"Setting protocol with leading U+001F (wpt++:)",
|
||
"Setting protocol with U+001F before inserted colon (wpt++:)",
|
||
"Setting port with leading U+001F (wpt++:)",
|
||
"Setting pathname with trailing U+001F (wpt++:)"
|
||
],
|
||
"url-tojson.any.html": true,
|
||
"url-tojson.any.worker.html": true,
|
||
"urlencoded-parser.any.html": true,
|
||
"urlencoded-parser.any.worker.html": true,
|
||
"urlsearchparams-append.any.html": true,
|
||
"urlsearchparams-append.any.worker.html": true,
|
||
"urlsearchparams-constructor.any.html": true,
|
||
"urlsearchparams-constructor.any.worker.html": true,
|
||
"urlsearchparams-delete.any.html": true,
|
||
"urlsearchparams-delete.any.worker.html": true,
|
||
"urlsearchparams-foreach.any.html": true,
|
||
"urlsearchparams-foreach.any.worker.html": true,
|
||
"urlsearchparams-get.any.html": true,
|
||
"urlsearchparams-get.any.worker.html": true,
|
||
"urlsearchparams-getall.any.html": true,
|
||
"urlsearchparams-getall.any.worker.html": true,
|
||
"urlsearchparams-has.any.html": true,
|
||
"urlsearchparams-has.any.worker.html": true,
|
||
"urlsearchparams-set.any.html": true,
|
||
"urlsearchparams-set.any.worker.html": true,
|
||
"urlsearchparams-sort.any.html": true,
|
||
"urlsearchparams-sort.any.worker.html": true,
|
||
"urlsearchparams-stringifier.any.html": true,
|
||
"urlsearchparams-stringifier.any.worker.html": true,
|
||
"url-setters.any.html": [
|
||
"URL: Setting <http://example.net/path>.hostname = 'example.com:8080' : delimiter invalidates entire value",
|
||
"URL: Setting <http://example.net:8080/path>.hostname = 'example.com:' : delimiter invalidates entire value",
|
||
"URL: Setting <non-spec:/.//p>.hostname = 'h' Drop /. from path",
|
||
"URL: Setting <non-spec:/.//p>.hostname = ''",
|
||
"URL: Setting <foo://somehost/some/path>.pathname = '' Non-special URLs can have their paths erased",
|
||
"URL: Setting <foo:///some/path>.pathname = '' Non-special URLs with an empty host can have their paths erased",
|
||
"URL: Setting <file://monkey/>.pathname = '\\\\' File URLs and (back)slashes",
|
||
"URL: Setting <file:///unicorn>.pathname = '//\\/' File URLs and (back)slashes",
|
||
"URL: Setting <file:///unicorn>.pathname = '//monkey/..//' File URLs and (back)slashes",
|
||
"URL: Setting <non-spec:/>.pathname = '/.//p' Serialize /. in path",
|
||
"URL: Setting <non-spec:/>.pathname = '/..//p'",
|
||
"URL: Setting <non-spec:/>.pathname = '//p'",
|
||
"URL: Setting <non-spec:/.//>.pathname = 'p' Drop /. from path"
|
||
],
|
||
"url-setters.any.worker.html": [
|
||
"URL: Setting <http://example.net/path>.hostname = 'example.com:8080' : delimiter invalidates entire value",
|
||
"URL: Setting <http://example.net:8080/path>.hostname = 'example.com:' : delimiter invalidates entire value",
|
||
"URL: Setting <non-spec:/.//p>.hostname = 'h' Drop /. from path",
|
||
"URL: Setting <non-spec:/.//p>.hostname = ''",
|
||
"URL: Setting <foo://somehost/some/path>.pathname = '' Non-special URLs can have their paths erased",
|
||
"URL: Setting <foo:///some/path>.pathname = '' Non-special URLs with an empty host can have their paths erased",
|
||
"URL: Setting <file://monkey/>.pathname = '\\\\' File URLs and (back)slashes",
|
||
"URL: Setting <file:///unicorn>.pathname = '//\\/' File URLs and (back)slashes",
|
||
"URL: Setting <file:///unicorn>.pathname = '//monkey/..//' File URLs and (back)slashes",
|
||
"URL: Setting <non-spec:/>.pathname = '/.//p' Serialize /. in path",
|
||
"URL: Setting <non-spec:/>.pathname = '/..//p'",
|
||
"URL: Setting <non-spec:/>.pathname = '//p'",
|
||
"URL: Setting <non-spec:/.//>.pathname = 'p' Drop /. from path"
|
||
]
|
||
},
|
||
"fetch": {
|
||
"api": {
|
||
"request": {
|
||
"request-init-002.any.html": true,
|
||
"request-init-002.any.worker.html": true,
|
||
"request-init-stream.any.html": true,
|
||
"request-init-stream.any.worker.html": true,
|
||
"request-consume-empty.any.html": [
|
||
"Consume empty FormData request body as text"
|
||
],
|
||
"request-consume-empty.any.worker.html": [
|
||
"Consume empty FormData request body as text"
|
||
],
|
||
"request-consume.any.html": true,
|
||
"request-consume.any.worker.html": true,
|
||
"request-disturbed.any.html": [
|
||
"Request construction failure should not set \"bodyUsed\"",
|
||
"Input request used for creating new request became disturbed",
|
||
"Input request used for creating new request became disturbed even if body is not used"
|
||
],
|
||
"request-disturbed.any.worker.html": [
|
||
"Request construction failure should not set \"bodyUsed\"",
|
||
"Input request used for creating new request became disturbed",
|
||
"Input request used for creating new request became disturbed even if body is not used"
|
||
],
|
||
"request-error.any.html": [
|
||
"RequestInit's window is not null",
|
||
"Input URL has credentials",
|
||
"RequestInit's mode is navigate",
|
||
"RequestInit's referrer is invalid",
|
||
"RequestInit's mode is no-cors and method is not simple",
|
||
"RequestInit's cache mode is only-if-cached and mode is not same-origin",
|
||
"Request with cache mode: only-if-cached and fetch mode cors",
|
||
"Request with cache mode: only-if-cached and fetch mode no-cors",
|
||
"Bad referrerPolicy init parameter value",
|
||
"Bad mode init parameter value",
|
||
"Bad credentials init parameter value",
|
||
"Bad cache init parameter value"
|
||
],
|
||
"request-error.any.worker.html": [
|
||
"RequestInit's window is not null",
|
||
"Input URL has credentials",
|
||
"RequestInit's mode is navigate",
|
||
"RequestInit's referrer is invalid",
|
||
"RequestInit's mode is no-cors and method is not simple",
|
||
"RequestInit's cache mode is only-if-cached and mode is not same-origin",
|
||
"Request with cache mode: only-if-cached and fetch mode cors",
|
||
"Request with cache mode: only-if-cached and fetch mode no-cors",
|
||
"Bad referrerPolicy init parameter value",
|
||
"Bad mode init parameter value",
|
||
"Bad credentials init parameter value",
|
||
"Bad cache init parameter value"
|
||
],
|
||
"request-headers.any.html": [
|
||
"Adding invalid request header \"Accept-Charset: KO\"",
|
||
"Adding invalid request header \"accept-charset: KO\"",
|
||
"Adding invalid request header \"ACCEPT-ENCODING: KO\"",
|
||
"Adding invalid request header \"Accept-Encoding: KO\"",
|
||
"Adding invalid request header \"Access-Control-Request-Headers: KO\"",
|
||
"Adding invalid request header \"Access-Control-Request-Method: KO\"",
|
||
"Adding invalid request header \"Connection: KO\"",
|
||
"Adding invalid request header \"Content-Length: KO\"",
|
||
"Adding invalid request header \"Cookie: KO\"",
|
||
"Adding invalid request header \"Cookie2: KO\"",
|
||
"Adding invalid request header \"Date: KO\"",
|
||
"Adding invalid request header \"DNT: KO\"",
|
||
"Adding invalid request header \"Expect: KO\"",
|
||
"Adding invalid request header \"Host: KO\"",
|
||
"Adding invalid request header \"Keep-Alive: KO\"",
|
||
"Adding invalid request header \"Origin: KO\"",
|
||
"Adding invalid request header \"Referer: KO\"",
|
||
"Adding invalid request header \"TE: KO\"",
|
||
"Adding invalid request header \"Trailer: KO\"",
|
||
"Adding invalid request header \"Transfer-Encoding: KO\"",
|
||
"Adding invalid request header \"Upgrade: KO\"",
|
||
"Adding invalid request header \"Via: KO\"",
|
||
"Adding invalid request header \"Proxy-: KO\"",
|
||
"Adding invalid request header \"proxy-a: KO\"",
|
||
"Adding invalid request header \"Sec-: KO\"",
|
||
"Adding invalid request header \"sec-b: KO\"",
|
||
"Adding invalid no-cors request header \"Content-Type: KO\"",
|
||
"Adding invalid no-cors request header \"Potato: KO\"",
|
||
"Adding invalid no-cors request header \"proxy: KO\"",
|
||
"Adding invalid no-cors request header \"proxya: KO\"",
|
||
"Adding invalid no-cors request header \"sec: KO\"",
|
||
"Adding invalid no-cors request header \"secb: KO\"",
|
||
"Check that request constructor is filtering headers provided as init parameter",
|
||
"Check that no-cors request constructor is filtering headers provided as init parameter",
|
||
"Check that no-cors request constructor is filtering headers provided as part of request parameter"
|
||
],
|
||
"request-headers.any.worker.html": [
|
||
"Adding invalid request header \"Accept-Charset: KO\"",
|
||
"Adding invalid request header \"accept-charset: KO\"",
|
||
"Adding invalid request header \"ACCEPT-ENCODING: KO\"",
|
||
"Adding invalid request header \"Accept-Encoding: KO\"",
|
||
"Adding invalid request header \"Access-Control-Request-Headers: KO\"",
|
||
"Adding invalid request header \"Access-Control-Request-Method: KO\"",
|
||
"Adding invalid request header \"Connection: KO\"",
|
||
"Adding invalid request header \"Content-Length: KO\"",
|
||
"Adding invalid request header \"Cookie: KO\"",
|
||
"Adding invalid request header \"Cookie2: KO\"",
|
||
"Adding invalid request header \"Date: KO\"",
|
||
"Adding invalid request header \"DNT: KO\"",
|
||
"Adding invalid request header \"Expect: KO\"",
|
||
"Adding invalid request header \"Host: KO\"",
|
||
"Adding invalid request header \"Keep-Alive: KO\"",
|
||
"Adding invalid request header \"Origin: KO\"",
|
||
"Adding invalid request header \"Referer: KO\"",
|
||
"Adding invalid request header \"TE: KO\"",
|
||
"Adding invalid request header \"Trailer: KO\"",
|
||
"Adding invalid request header \"Transfer-Encoding: KO\"",
|
||
"Adding invalid request header \"Upgrade: KO\"",
|
||
"Adding invalid request header \"Via: KO\"",
|
||
"Adding invalid request header \"Proxy-: KO\"",
|
||
"Adding invalid request header \"proxy-a: KO\"",
|
||
"Adding invalid request header \"Sec-: KO\"",
|
||
"Adding invalid request header \"sec-b: KO\"",
|
||
"Adding invalid no-cors request header \"Content-Type: KO\"",
|
||
"Adding invalid no-cors request header \"Potato: KO\"",
|
||
"Adding invalid no-cors request header \"proxy: KO\"",
|
||
"Adding invalid no-cors request header \"proxya: KO\"",
|
||
"Adding invalid no-cors request header \"sec: KO\"",
|
||
"Adding invalid no-cors request header \"secb: KO\"",
|
||
"Check that request constructor is filtering headers provided as init parameter",
|
||
"Check that no-cors request constructor is filtering headers provided as init parameter",
|
||
"Check that no-cors request constructor is filtering headers provided as part of request parameter"
|
||
],
|
||
"request-init-contenttype.any.html": true,
|
||
"request-init-contenttype.any.worker.html": true,
|
||
"request-structure.any.html": [
|
||
"Check destination attribute",
|
||
"Check referrer attribute",
|
||
"Check referrerPolicy attribute",
|
||
"Check mode attribute",
|
||
"Check credentials attribute",
|
||
"Check cache attribute",
|
||
"Check integrity attribute",
|
||
"Check isReloadNavigation attribute",
|
||
"Check isHistoryNavigation attribute"
|
||
],
|
||
"request-structure.any.worker.html": [
|
||
"Check destination attribute",
|
||
"Check referrer attribute",
|
||
"Check referrerPolicy attribute",
|
||
"Check mode attribute",
|
||
"Check credentials attribute",
|
||
"Check cache attribute",
|
||
"Check integrity attribute",
|
||
"Check isReloadNavigation attribute",
|
||
"Check isHistoryNavigation attribute"
|
||
]
|
||
},
|
||
"headers": {
|
||
"header-values-normalize.any.html": [
|
||
"XMLHttpRequest with value %00",
|
||
"XMLHttpRequest with value %01",
|
||
"XMLHttpRequest with value %02",
|
||
"XMLHttpRequest with value %03",
|
||
"XMLHttpRequest with value %04",
|
||
"XMLHttpRequest with value %05",
|
||
"XMLHttpRequest with value %06",
|
||
"XMLHttpRequest with value %07",
|
||
"XMLHttpRequest with value %08",
|
||
"XMLHttpRequest with value %09",
|
||
"XMLHttpRequest with value %0A",
|
||
"XMLHttpRequest with value %0D",
|
||
"XMLHttpRequest with value %0E",
|
||
"XMLHttpRequest with value %0F",
|
||
"XMLHttpRequest with value %10",
|
||
"XMLHttpRequest with value %11",
|
||
"XMLHttpRequest with value %12",
|
||
"XMLHttpRequest with value %13",
|
||
"XMLHttpRequest with value %14",
|
||
"XMLHttpRequest with value %15",
|
||
"XMLHttpRequest with value %16",
|
||
"XMLHttpRequest with value %17",
|
||
"XMLHttpRequest with value %18",
|
||
"XMLHttpRequest with value %19",
|
||
"XMLHttpRequest with value %1A",
|
||
"XMLHttpRequest with value %1B",
|
||
"XMLHttpRequest with value %1C",
|
||
"XMLHttpRequest with value %1D",
|
||
"XMLHttpRequest with value %1E",
|
||
"XMLHttpRequest with value %1F",
|
||
"XMLHttpRequest with value %20",
|
||
"fetch() with value %01",
|
||
"fetch() with value %02",
|
||
"fetch() with value %03",
|
||
"fetch() with value %04",
|
||
"fetch() with value %05",
|
||
"fetch() with value %06",
|
||
"fetch() with value %07",
|
||
"fetch() with value %08",
|
||
"fetch() with value %0E",
|
||
"fetch() with value %0F",
|
||
"fetch() with value %10",
|
||
"fetch() with value %11",
|
||
"fetch() with value %12",
|
||
"fetch() with value %13",
|
||
"fetch() with value %14",
|
||
"fetch() with value %15",
|
||
"fetch() with value %16",
|
||
"fetch() with value %17",
|
||
"fetch() with value %18",
|
||
"fetch() with value %19",
|
||
"fetch() with value %1A",
|
||
"fetch() with value %1B",
|
||
"fetch() with value %1C",
|
||
"fetch() with value %1D",
|
||
"fetch() with value %1E",
|
||
"fetch() with value %1F"
|
||
],
|
||
"header-values-normalize.any.worker.html": [
|
||
"fetch() with value %01",
|
||
"fetch() with value %02",
|
||
"fetch() with value %03",
|
||
"fetch() with value %04",
|
||
"fetch() with value %05",
|
||
"fetch() with value %06",
|
||
"fetch() with value %07",
|
||
"fetch() with value %08",
|
||
"fetch() with value %0E",
|
||
"fetch() with value %0F",
|
||
"fetch() with value %10",
|
||
"fetch() with value %11",
|
||
"fetch() with value %12",
|
||
"fetch() with value %13",
|
||
"fetch() with value %14",
|
||
"fetch() with value %15",
|
||
"fetch() with value %16",
|
||
"fetch() with value %17",
|
||
"fetch() with value %18",
|
||
"fetch() with value %19",
|
||
"fetch() with value %1A",
|
||
"fetch() with value %1B",
|
||
"fetch() with value %1C",
|
||
"fetch() with value %1D",
|
||
"fetch() with value %1E",
|
||
"fetch() with value %1F"
|
||
],
|
||
"header-values.any.html": [
|
||
"XMLHttpRequest with value x%00x needs to throw",
|
||
"XMLHttpRequest with value x%0Ax needs to throw",
|
||
"XMLHttpRequest with value x%0Dx needs to throw",
|
||
"XMLHttpRequest with all valid values",
|
||
"fetch() with all valid values"
|
||
],
|
||
"header-values.any.worker.html": [
|
||
"fetch() with all valid values"
|
||
],
|
||
"headers-basic.any.html": true,
|
||
"headers-casing.any.html": true,
|
||
"headers-combine.any.html": true,
|
||
"headers-errors.any.html": true,
|
||
"headers-normalize.any.html": true,
|
||
"headers-record.any.html": true,
|
||
"headers-structure.any.html": true,
|
||
"headers-basic.any.worker.html": true,
|
||
"headers-casing.any.worker.html": true,
|
||
"headers-combine.any.worker.html": true,
|
||
"headers-errors.any.worker.html": true,
|
||
"headers-no-cors.any.html": [
|
||
"\"no-cors\" Headers object cannot have accept set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have accept-language set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have content-language set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have accept set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have accept-language set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have content-language set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have content-type set to text/plain;ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, text/plain",
|
||
"\"no-cors\" Headers object cannot have accept/\" as header",
|
||
"\"no-cors\" Headers object cannot have accept/012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678 as header",
|
||
"\"no-cors\" Headers object cannot have accept-language/\u0001 as header",
|
||
"\"no-cors\" Headers object cannot have accept-language/@ as header",
|
||
"\"no-cors\" Headers object cannot have authorization/basics as header",
|
||
"\"no-cors\" Headers object cannot have content-language/\u0001 as header",
|
||
"\"no-cors\" Headers object cannot have content-language/@ as header",
|
||
"\"no-cors\" Headers object cannot have content-type/text/html as header",
|
||
"\"no-cors\" Headers object cannot have content-type/text/plain; long=0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901 as header",
|
||
"\"no-cors\" Headers object cannot have range/bytes 0- as header",
|
||
"\"no-cors\" Headers object cannot have test/hi as header",
|
||
"\"no-cors\" Headers object cannot have dpr/2 as header",
|
||
"\"no-cors\" Headers object cannot have downlink/1 as header",
|
||
"\"no-cors\" Headers object cannot have save-data/on as header",
|
||
"\"no-cors\" Headers object cannot have viewport-width/100 as header",
|
||
"\"no-cors\" Headers object cannot have width/100 as header",
|
||
"\"no-cors\" Headers object cannot have unknown/doesitmatter as header"
|
||
],
|
||
"headers-no-cors.any.worker.html": [
|
||
"\"no-cors\" Headers object cannot have accept set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have accept-language set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have content-language set to sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have accept set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have accept-language set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have content-language set to , sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss",
|
||
"\"no-cors\" Headers object cannot have content-type set to text/plain;ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss, text/plain",
|
||
"\"no-cors\" Headers object cannot have accept/\" as header",
|
||
"\"no-cors\" Headers object cannot have accept/012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678 as header",
|
||
"\"no-cors\" Headers object cannot have accept-language/\u0001 as header",
|
||
"\"no-cors\" Headers object cannot have accept-language/@ as header",
|
||
"\"no-cors\" Headers object cannot have authorization/basics as header",
|
||
"\"no-cors\" Headers object cannot have content-language/\u0001 as header",
|
||
"\"no-cors\" Headers object cannot have content-language/@ as header",
|
||
"\"no-cors\" Headers object cannot have content-type/text/html as header",
|
||
"\"no-cors\" Headers object cannot have content-type/text/plain; long=0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901 as header",
|
||
"\"no-cors\" Headers object cannot have range/bytes 0- as header",
|
||
"\"no-cors\" Headers object cannot have test/hi as header",
|
||
"\"no-cors\" Headers object cannot have dpr/2 as header",
|
||
"\"no-cors\" Headers object cannot have downlink/1 as header",
|
||
"\"no-cors\" Headers object cannot have save-data/on as header",
|
||
"\"no-cors\" Headers object cannot have viewport-width/100 as header",
|
||
"\"no-cors\" Headers object cannot have width/100 as header",
|
||
"\"no-cors\" Headers object cannot have unknown/doesitmatter as header"
|
||
],
|
||
"headers-normalize.any.worker.html": true,
|
||
"headers-record.any.worker.html": true,
|
||
"headers-structure.any.worker.html": true
|
||
},
|
||
"basic": {
|
||
"request-head.any.html": true,
|
||
"request-head.any.worker.html": true,
|
||
"request-headers-case.any.html": false,
|
||
"request-headers-case.any.worker.html": false,
|
||
"request-headers-nonascii.any.html": true,
|
||
"request-headers-nonascii.any.worker.html": true,
|
||
"request-headers.any.html": [
|
||
"Fetch with PUT without body",
|
||
"Fetch with PUT with body",
|
||
"Fetch with POST without body",
|
||
"Fetch with POST with text body",
|
||
"Fetch with POST with FormData body",
|
||
"Fetch with POST with URLSearchParams body",
|
||
"Fetch with POST with Blob body",
|
||
"Fetch with POST with ArrayBuffer body",
|
||
"Fetch with POST with Uint8Array body",
|
||
"Fetch with POST with Int8Array body",
|
||
"Fetch with POST with Float32Array body",
|
||
"Fetch with POST with Float64Array body",
|
||
"Fetch with POST with DataView body",
|
||
"Fetch with POST with Blob body with mime type",
|
||
"Fetch with Chicken",
|
||
"Fetch with Chicken with body",
|
||
"Fetch with POST and mode \"same-origin\" needs an Origin header",
|
||
"Fetch with POST and mode \"no-cors\" needs an Origin header",
|
||
"Fetch with PUT and mode \"same-origin\" needs an Origin header",
|
||
"Fetch with TacO and mode \"same-origin\" needs an Origin header",
|
||
"Fetch with TacO and mode \"cors\" needs an Origin header"
|
||
],
|
||
"request-headers.any.worker.html": [
|
||
"Fetch with PUT without body",
|
||
"Fetch with PUT with body",
|
||
"Fetch with POST without body",
|
||
"Fetch with POST with text body",
|
||
"Fetch with POST with FormData body",
|
||
"Fetch with POST with URLSearchParams body",
|
||
"Fetch with POST with Blob body",
|
||
"Fetch with POST with ArrayBuffer body",
|
||
"Fetch with POST with Uint8Array body",
|
||
"Fetch with POST with Int8Array body",
|
||
"Fetch with POST with Float32Array body",
|
||
"Fetch with POST with Float64Array body",
|
||
"Fetch with POST with DataView body",
|
||
"Fetch with POST with Blob body with mime type",
|
||
"Fetch with Chicken",
|
||
"Fetch with Chicken with body",
|
||
"Fetch with POST and mode \"same-origin\" needs an Origin header",
|
||
"Fetch with POST and mode \"no-cors\" needs an Origin header",
|
||
"Fetch with PUT and mode \"same-origin\" needs an Origin header",
|
||
"Fetch with TacO and mode \"same-origin\" needs an Origin header",
|
||
"Fetch with TacO and mode \"cors\" needs an Origin header"
|
||
],
|
||
"text-utf8.any.html": true,
|
||
"text-utf8.any.worker.html": true,
|
||
"accept-header.any.html": [
|
||
"Request through fetch should have a 'accept-language' header"
|
||
],
|
||
"accept-header.any.worker.html": [
|
||
"Request through fetch should have a 'accept-language' header"
|
||
],
|
||
"conditional-get.any.html": false,
|
||
"conditional-get.any.worker.html": false,
|
||
"error-after-response.any.html": false,
|
||
"header-value-combining.any.html": false,
|
||
"header-value-combining.any.worker.html": false,
|
||
"header-value-null-byte.any.html": true,
|
||
"header-value-null-byte.any.worker.html": true,
|
||
"historical.any.html": true,
|
||
"historical.any.worker.html": true,
|
||
"http-response-code.any.html": true,
|
||
"http-response-code.any.worker.html": true,
|
||
"request-upload.any.html": [
|
||
"Fetch with POST with ReadableStream containing String",
|
||
"Fetch with POST with ReadableStream containing null",
|
||
"Fetch with POST with ReadableStream containing number",
|
||
"Fetch with POST with ReadableStream containing ArrayBuffer",
|
||
"Fetch with POST with ReadableStream containing Blob",
|
||
"Fetch with POST with text body on 421 response should be retried once on new connection."
|
||
],
|
||
"request-upload.any.worker.html": [
|
||
"Fetch with POST with ReadableStream containing String",
|
||
"Fetch with POST with ReadableStream containing null",
|
||
"Fetch with POST with ReadableStream containing number",
|
||
"Fetch with POST with ReadableStream containing ArrayBuffer",
|
||
"Fetch with POST with ReadableStream containing Blob",
|
||
"Fetch with POST with text body on 421 response should be retried once on new connection."
|
||
],
|
||
"response-url.sub.any.html": true,
|
||
"response-url.sub.any.worker.html": true,
|
||
"scheme-about.any.html": true,
|
||
"scheme-about.any.worker.html": true,
|
||
"scheme-blob.sub.any.html": true,
|
||
"scheme-blob.sub.any.worker.html": true,
|
||
"scheme-data.any.html": true,
|
||
"scheme-data.any.worker.html": true,
|
||
"scheme-others.sub.any.html": true,
|
||
"scheme-others.sub.any.worker.html": true,
|
||
"stream-response.any.html": true,
|
||
"stream-response.any.worker.html": true,
|
||
"stream-safe-creation.any.html": [
|
||
"throwing Object.prototype.start accessor should not affect stream creation by 'fetch'",
|
||
"Object.prototype.start accessor returning invalid value should not affect stream creation by 'fetch'",
|
||
"throwing Object.prototype.type accessor should not affect stream creation by 'fetch'",
|
||
"throwing Object.prototype.size accessor should not affect stream creation by 'fetch'",
|
||
"Object.prototype.size accessor returning invalid value should not affect stream creation by 'fetch'",
|
||
"throwing Object.prototype.highWaterMark accessor should not affect stream creation by 'fetch'",
|
||
"Object.prototype.highWaterMark accessor returning invalid value should not affect stream creation by 'fetch'"
|
||
],
|
||
"stream-safe-creation.any.worker.html": [
|
||
"throwing Object.prototype.start accessor should not affect stream creation by 'fetch'",
|
||
"Object.prototype.start accessor returning invalid value should not affect stream creation by 'fetch'",
|
||
"throwing Object.prototype.type accessor should not affect stream creation by 'fetch'",
|
||
"throwing Object.prototype.size accessor should not affect stream creation by 'fetch'",
|
||
"Object.prototype.size accessor returning invalid value should not affect stream creation by 'fetch'",
|
||
"throwing Object.prototype.highWaterMark accessor should not affect stream creation by 'fetch'",
|
||
"Object.prototype.highWaterMark accessor returning invalid value should not affect stream creation by 'fetch'"
|
||
],
|
||
"integrity.sub.any.html": [
|
||
"Invalid integrity",
|
||
"Multiple integrities: invalid stronger than valid",
|
||
"Multiple integrities: both are invalid",
|
||
"CORS invalid integrity",
|
||
"Empty string integrity for opaque response",
|
||
"SHA-* integrity for opaque response"
|
||
],
|
||
"integrity.sub.any.worker.html": [
|
||
"Invalid integrity",
|
||
"Multiple integrities: invalid stronger than valid",
|
||
"Multiple integrities: both are invalid",
|
||
"CORS invalid integrity",
|
||
"Empty string integrity for opaque response",
|
||
"SHA-* integrity for opaque response"
|
||
]
|
||
},
|
||
"response": {
|
||
"json.any.html": true,
|
||
"json.any.worker.html": true,
|
||
"response-init-001.any.html": true,
|
||
"response-init-001.any.worker.html": true,
|
||
"response-init-002.any.html": true,
|
||
"response-init-002.any.worker.html": true,
|
||
"response-static-error.any.html": true,
|
||
"response-static-error.any.worker.html": true,
|
||
"response-static-redirect.any.html": true,
|
||
"response-static-redirect.any.worker.html": true,
|
||
"response-stream-disturbed-1.any.html": true,
|
||
"response-stream-disturbed-1.any.worker.html": true,
|
||
"response-stream-disturbed-2.any.html": true,
|
||
"response-stream-disturbed-2.any.worker.html": true,
|
||
"response-stream-disturbed-3.any.html": true,
|
||
"response-stream-disturbed-3.any.worker.html": true,
|
||
"response-stream-disturbed-4.any.html": true,
|
||
"response-stream-disturbed-4.any.worker.html": true,
|
||
"response-stream-disturbed-5.any.html": true,
|
||
"response-stream-disturbed-5.any.worker.html": true,
|
||
"response-stream-disturbed-6.any.html": true,
|
||
"response-stream-disturbed-6.any.worker.html": true,
|
||
"response-stream-disturbed-by-pipe.any.html": true,
|
||
"response-stream-disturbed-by-pipe.any.worker.html": true,
|
||
"response-stream-with-broken-then.any.html": [
|
||
"Attempt to inject {done: false, value: bye} via Object.prototype.then.",
|
||
"Attempt to inject value: undefined via Object.prototype.then.",
|
||
"Attempt to inject undefined via Object.prototype.then.",
|
||
"Attempt to inject 8.2 via Object.prototype.then.",
|
||
"intercepting arraybuffer to text conversion via Object.prototype.then should not be possible"
|
||
],
|
||
"response-stream-with-broken-then.any.worker.html": [
|
||
"Attempt to inject {done: false, value: bye} via Object.prototype.then.",
|
||
"Attempt to inject value: undefined via Object.prototype.then.",
|
||
"Attempt to inject undefined via Object.prototype.then.",
|
||
"Attempt to inject 8.2 via Object.prototype.then.",
|
||
"intercepting arraybuffer to text conversion via Object.prototype.then should not be possible"
|
||
],
|
||
"response-error-from-stream.any.html": true,
|
||
"response-error-from-stream.any.worker.html": true,
|
||
"response-error.any.html": true,
|
||
"response-error.any.worker.html": true,
|
||
"response-from-stream.any.html": true,
|
||
"response-from-stream.any.worker.html": true,
|
||
"response-cancel-stream.any.html": true,
|
||
"response-cancel-stream.any.worker.html": true,
|
||
"response-clone.any.html": [
|
||
"Check response clone use structureClone for teed ReadableStreams (Int8Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Int16Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Int32Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (ArrayBufferchunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Uint8Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Uint8ClampedArraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Uint16Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Uint32Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (BigInt64Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (BigUint64Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Float32Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Float64Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (DataViewchunk)"
|
||
],
|
||
"response-clone.any.worker.html": [
|
||
"Check response clone use structureClone for teed ReadableStreams (Int8Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Int16Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Int32Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (ArrayBufferchunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Uint8Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Uint8ClampedArraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Uint16Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Uint32Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (BigInt64Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (BigUint64Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Float32Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (Float64Arraychunk)",
|
||
"Check response clone use structureClone for teed ReadableStreams (DataViewchunk)"
|
||
],
|
||
"response-consume-empty.any.html": [
|
||
"Consume empty FormData response body as text"
|
||
],
|
||
"response-consume-empty.any.worker.html": [
|
||
"Consume empty FormData response body as text"
|
||
],
|
||
"response-consume-stream.any.html": true,
|
||
"response-consume-stream.any.worker.html": true,
|
||
"response-init-contenttype.any.html": true,
|
||
"response-init-contenttype.any.worker.html": true
|
||
},
|
||
"body": {
|
||
"formdata.any.html": [
|
||
"Consume empty response.formData() as FormData",
|
||
"Consume empty request.formData() as FormData"
|
||
],
|
||
"formdata.any.worker.html": [
|
||
"Consume empty response.formData() as FormData",
|
||
"Consume empty request.formData() as FormData"
|
||
],
|
||
"mime-type.any.html": true,
|
||
"mime-type.any.worker.html": true
|
||
},
|
||
"redirect": {
|
||
"redirect-count.any.html": true,
|
||
"redirect-count.any.worker.html": true,
|
||
"redirect-empty-location.any.html": [
|
||
"redirect response with empty Location, manual mode"
|
||
],
|
||
"redirect-empty-location.any.worker.html": [
|
||
"redirect response with empty Location, manual mode"
|
||
],
|
||
"redirect-location-escape.tentative.any.html": [
|
||
"Redirect to unescaped UTF-8",
|
||
"Redirect to escaped and unescaped UTF-8",
|
||
"Escaping produces double-percent",
|
||
"Redirect to invalid UTF-8"
|
||
],
|
||
"redirect-location-escape.tentative.any.worker.html": [
|
||
"Redirect to unescaped UTF-8",
|
||
"Redirect to escaped and unescaped UTF-8",
|
||
"Escaping produces double-percent",
|
||
"Redirect to invalid UTF-8"
|
||
],
|
||
"redirect-location.any.html": [
|
||
"Redirect 301 in \"manual\" mode without location",
|
||
"Redirect 301 in \"manual\" mode with invalid location",
|
||
"Redirect 301 in \"manual\" mode with data location",
|
||
"Redirect 302 in \"manual\" mode without location",
|
||
"Redirect 302 in \"manual\" mode with invalid location",
|
||
"Redirect 302 in \"manual\" mode with data location",
|
||
"Redirect 303 in \"manual\" mode without location",
|
||
"Redirect 303 in \"manual\" mode with invalid location",
|
||
"Redirect 303 in \"manual\" mode with data location",
|
||
"Redirect 307 in \"manual\" mode without location",
|
||
"Redirect 307 in \"manual\" mode with invalid location",
|
||
"Redirect 307 in \"manual\" mode with data location",
|
||
"Redirect 308 in \"manual\" mode without location",
|
||
"Redirect 308 in \"manual\" mode with invalid location",
|
||
"Redirect 308 in \"manual\" mode with data location"
|
||
],
|
||
"redirect-location.any.worker.html": [
|
||
"Redirect 301 in \"manual\" mode without location",
|
||
"Redirect 301 in \"manual\" mode with invalid location",
|
||
"Redirect 301 in \"manual\" mode with data location",
|
||
"Redirect 302 in \"manual\" mode without location",
|
||
"Redirect 302 in \"manual\" mode with invalid location",
|
||
"Redirect 302 in \"manual\" mode with data location",
|
||
"Redirect 303 in \"manual\" mode without location",
|
||
"Redirect 303 in \"manual\" mode with invalid location",
|
||
"Redirect 303 in \"manual\" mode with data location",
|
||
"Redirect 307 in \"manual\" mode without location",
|
||
"Redirect 307 in \"manual\" mode with invalid location",
|
||
"Redirect 307 in \"manual\" mode with data location",
|
||
"Redirect 308 in \"manual\" mode without location",
|
||
"Redirect 308 in \"manual\" mode with invalid location",
|
||
"Redirect 308 in \"manual\" mode with data location"
|
||
],
|
||
"redirect-method.any.html": true,
|
||
"redirect-method.any.worker.html": true,
|
||
"redirect-schemes.any.html": true,
|
||
"redirect-schemes.any.worker.html": true,
|
||
"redirect-to-dataurl.any.html": true,
|
||
"redirect-to-dataurl.any.worker.html": true
|
||
},
|
||
"idlharness.any.html": [
|
||
"Request interface: attribute destination",
|
||
"Request interface: attribute referrer",
|
||
"Request interface: attribute referrerPolicy",
|
||
"Request interface: attribute mode",
|
||
"Request interface: attribute credentials",
|
||
"Request interface: attribute cache",
|
||
"Request interface: attribute integrity",
|
||
"Request interface: attribute keepalive",
|
||
"Request interface: attribute isReloadNavigation",
|
||
"Request interface: attribute isHistoryNavigation",
|
||
"Request interface: attribute body",
|
||
"Request interface: attribute bodyUsed",
|
||
"Request interface: new Request('about:blank') must inherit property \"destination\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"referrer\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"referrerPolicy\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"mode\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"credentials\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"cache\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"integrity\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"keepalive\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"isReloadNavigation\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"isHistoryNavigation\" with the proper type",
|
||
"Response interface: operation error()",
|
||
"Response interface: operation redirect(USVString, optional unsigned short)",
|
||
"Response interface: attribute body",
|
||
"Response interface: attribute bodyUsed",
|
||
"Response interface: calling redirect(USVString, optional unsigned short) on new Response() with too few arguments must throw TypeError",
|
||
"Window interface: operation fetch(RequestInfo, optional RequestInit)"
|
||
],
|
||
"idlharness.any.worker.html": [
|
||
"Request interface: attribute destination",
|
||
"Request interface: attribute referrer",
|
||
"Request interface: attribute referrerPolicy",
|
||
"Request interface: attribute mode",
|
||
"Request interface: attribute credentials",
|
||
"Request interface: attribute cache",
|
||
"Request interface: attribute integrity",
|
||
"Request interface: attribute keepalive",
|
||
"Request interface: attribute isReloadNavigation",
|
||
"Request interface: attribute isHistoryNavigation",
|
||
"Request interface: attribute body",
|
||
"Request interface: attribute bodyUsed",
|
||
"Request interface: new Request('about:blank') must inherit property \"destination\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"referrer\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"referrerPolicy\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"mode\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"credentials\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"cache\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"integrity\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"keepalive\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"isReloadNavigation\" with the proper type",
|
||
"Request interface: new Request('about:blank') must inherit property \"isHistoryNavigation\" with the proper type",
|
||
"Response interface: operation error()",
|
||
"Response interface: operation redirect(USVString, optional unsigned short)",
|
||
"Response interface: attribute body",
|
||
"Response interface: attribute bodyUsed",
|
||
"Response interface: calling redirect(USVString, optional unsigned short) on new Response() with too few arguments must throw TypeError",
|
||
"WorkerGlobalScope interface: operation fetch(RequestInfo, optional RequestInit)",
|
||
"WorkerGlobalScope interface: self must inherit property \"fetch(RequestInfo, optional RequestInit)\" with the proper type",
|
||
"WorkerGlobalScope interface: calling fetch(RequestInfo, optional RequestInit) on self with too few arguments must throw TypeError"
|
||
],
|
||
"abort": {
|
||
"general.any.html": [
|
||
"response.arrayBuffer() rejects if already aborted",
|
||
"response.blob() rejects if already aborted",
|
||
"response.formData() rejects if already aborted",
|
||
"response.json() rejects if already aborted",
|
||
"response.text() rejects if already aborted",
|
||
"Call text() twice on aborted response"
|
||
],
|
||
"general.any.worker.html": [
|
||
"response.arrayBuffer() rejects if already aborted",
|
||
"response.blob() rejects if already aborted",
|
||
"response.formData() rejects if already aborted",
|
||
"response.json() rejects if already aborted",
|
||
"response.text() rejects if already aborted",
|
||
"Call text() twice on aborted response"
|
||
]
|
||
}
|
||
},
|
||
"content-encoding": {
|
||
"bad-gzip-body.any.html": [
|
||
"Consuming the body of a resource with bad gzip content with arrayBuffer() should reject",
|
||
"Consuming the body of a resource with bad gzip content with blob() should reject",
|
||
"Consuming the body of a resource with bad gzip content with formData() should reject",
|
||
"Consuming the body of a resource with bad gzip content with json() should reject",
|
||
"Consuming the body of a resource with bad gzip content with text() should reject"
|
||
],
|
||
"bad-gzip-body.any.worker.html": [
|
||
"Consuming the body of a resource with bad gzip content with arrayBuffer() should reject",
|
||
"Consuming the body of a resource with bad gzip content with blob() should reject",
|
||
"Consuming the body of a resource with bad gzip content with formData() should reject",
|
||
"Consuming the body of a resource with bad gzip content with json() should reject",
|
||
"Consuming the body of a resource with bad gzip content with text() should reject"
|
||
]
|
||
},
|
||
"content-length": {
|
||
"api-and-duplicate-headers.any.html": [
|
||
"XMLHttpRequest and duplicate Content-Length/Content-Type headers",
|
||
"fetch() and duplicate Content-Length/Content-Type headers"
|
||
],
|
||
"api-and-duplicate-headers.any.worker.html": [
|
||
"XMLHttpRequest and duplicate Content-Length/Content-Type headers",
|
||
"fetch() and duplicate Content-Length/Content-Type headers"
|
||
],
|
||
"parsing.window.html": [
|
||
"Input: \"Content-Length: aaaah\\r\\nContent-Length: aaaah\". Expected: 42.",
|
||
"Input: \"Content-Length: aaaah, aaaah\". Expected: 42.",
|
||
"Input: \"Content-Length: aaaah\". Expected: 42.",
|
||
"Input: \"Content-Length: 42s\". Expected: 42.",
|
||
"Input: \"Content-Length: 30s\". Expected: 42.",
|
||
"Input: \"Content-Length: -1\". Expected: 42.",
|
||
"Input: \"Content-Length: 0x20\". Expected: 42.",
|
||
"Input: \"Content-Length: 030\\r\\nContent-Length: 30\". Expected: network error.",
|
||
"Input: \"Content-Length: 030, 30\". Expected: network error.",
|
||
"Input: \"Content-Length: \\\"30\\\"\". Expected: 42.",
|
||
"Input: \"Content-Length: \". Expected: 42."
|
||
],
|
||
"too-long.window.html": [
|
||
"Content-Length header value of network response exceeds response body"
|
||
]
|
||
},
|
||
"content-type": {
|
||
"response.window.html": [
|
||
"<iframe>: separate response Content-Type: text/plain",
|
||
"<iframe>: combined response Content-Type: text/plain",
|
||
"<iframe>: separate response Content-Type: text/plain ",
|
||
"<iframe>: combined response Content-Type: text/plain ",
|
||
"<iframe>: separate response Content-Type: text/html text/plain",
|
||
"<iframe>: combined response Content-Type: text/html text/plain",
|
||
"<iframe>: separate response Content-Type: text/plain;charset=gbk text/html",
|
||
"<iframe>: combined response Content-Type: text/plain;charset=gbk text/html",
|
||
"<iframe>: separate response Content-Type: text/plain;charset=gbk text/html;charset=windows-1254",
|
||
"<iframe>: combined response Content-Type: text/plain;charset=gbk text/html;charset=windows-1254",
|
||
"<iframe>: separate response Content-Type: text/plain;charset=gbk text/plain",
|
||
"<iframe>: combined response Content-Type: text/plain;charset=gbk text/plain",
|
||
"<iframe>: separate response Content-Type: text/plain;charset=gbk text/plain;charset=windows-1252",
|
||
"<iframe>: combined response Content-Type: text/plain;charset=gbk text/plain;charset=windows-1252",
|
||
"<iframe>: separate response Content-Type: text/html;charset=gbk text/html;x=\",text/plain",
|
||
"<iframe>: combined response Content-Type: text/html;charset=gbk text/html;x=\",text/plain",
|
||
"<iframe>: separate response Content-Type: text/plain;charset=gbk;x=foo text/plain",
|
||
"<iframe>: combined response Content-Type: text/plain;charset=gbk;x=foo text/plain",
|
||
"<iframe>: separate response Content-Type: text/html;charset=gbk text/plain text/html",
|
||
"<iframe>: combined response Content-Type: text/html;charset=gbk text/plain text/html",
|
||
"<iframe>: separate response Content-Type: text/plain */*",
|
||
"<iframe>: combined response Content-Type: text/plain */*",
|
||
"<iframe>: separate response Content-Type: text/html */*",
|
||
"<iframe>: combined response Content-Type: text/html */*",
|
||
"<iframe>: separate response Content-Type: */* text/html",
|
||
"<iframe>: combined response Content-Type: */* text/html",
|
||
"<iframe>: separate response Content-Type: text/plain */*;charset=gbk",
|
||
"<iframe>: combined response Content-Type: text/plain */*;charset=gbk",
|
||
"<iframe>: separate response Content-Type: text/html */*;charset=gbk",
|
||
"<iframe>: combined response Content-Type: text/html */*;charset=gbk",
|
||
"<iframe>: separate response Content-Type: text/html;x=\" text/plain",
|
||
"<iframe>: combined response Content-Type: text/html;x=\" text/plain",
|
||
"<iframe>: separate response Content-Type: text/html;\" text/plain",
|
||
"<iframe>: combined response Content-Type: text/html;\" text/plain",
|
||
"<iframe>: separate response Content-Type: text/html;\" \\\" text/plain",
|
||
"<iframe>: combined response Content-Type: text/html;\" \\\" text/plain",
|
||
"<iframe>: separate response Content-Type: text/html;\" \\\" text/plain \";charset=GBK",
|
||
"<iframe>: combined response Content-Type: text/html;\" \\\" text/plain \";charset=GBK",
|
||
"<iframe>: separate response Content-Type: text/html;\" \" text/plain",
|
||
"<iframe>: combined response Content-Type: text/html;\" \" text/plain",
|
||
"fetch(): separate response Content-Type: text/plain;charset=gbk text/plain",
|
||
"fetch(): combined response Content-Type: text/plain;charset=gbk text/plain",
|
||
"Request: combined response Content-Type: text/plain;charset=gbk text/plain",
|
||
"Response: combined response Content-Type: text/plain;charset=gbk text/plain",
|
||
"fetch(): separate response Content-Type: text/html;charset=gbk text/html;x=\",text/plain",
|
||
"fetch(): combined response Content-Type: text/html;charset=gbk text/html;x=\",text/plain",
|
||
"Request: combined response Content-Type: text/html;charset=gbk text/html;x=\",text/plain",
|
||
"Response: combined response Content-Type: text/html;charset=gbk text/html;x=\",text/plain",
|
||
"fetch(): separate response Content-Type: text/plain;charset=gbk;x=foo text/plain",
|
||
"fetch(): combined response Content-Type: text/plain;charset=gbk;x=foo text/plain",
|
||
"Request: combined response Content-Type: text/plain;charset=gbk;x=foo text/plain",
|
||
"Response: combined response Content-Type: text/plain;charset=gbk;x=foo text/plain",
|
||
"fetch(): combined response Content-Type: text/html;x=\" text/plain",
|
||
"fetch(): separate response Content-Type: text/html;\" \\\" text/plain \";charset=GBK",
|
||
"fetch(): combined response Content-Type: text/html;\" \\\" text/plain \";charset=GBK",
|
||
"Request: combined response Content-Type: text/html;\" \\\" text/plain \";charset=GBK",
|
||
"Response: combined response Content-Type: text/html;\" \\\" text/plain \";charset=GBK"
|
||
]
|
||
},
|
||
"data-urls": {
|
||
"base64.any.html": true,
|
||
"base64.any.worker.html": true,
|
||
"processing.any.html": [
|
||
"\"data:text/plain;a=\\\",\\\",X\""
|
||
],
|
||
"processing.any.worker.html": [
|
||
"\"data:text/plain;a=\\\",\\\",X\""
|
||
]
|
||
},
|
||
"h1-parsing": {
|
||
"lone-cr.window.html": [
|
||
"Parsing response with a lone CR before message-body (HTTP/1.1 200 OK\nHeader: Value\r\n\nBody)"
|
||
],
|
||
"status-code.window.html": [
|
||
"HTTP/1.1 0 OK ",
|
||
"HTTP/1.1 1 OK ",
|
||
"HTTP/1.1 99 NOT OK ",
|
||
"HTTP/1.1 077 77 ",
|
||
"HTTP/1.1 099 HELLO ",
|
||
"HTTP/1.1 200 ",
|
||
"HTTP/1.1 999 DOES IT MATTER "
|
||
]
|
||
},
|
||
"range": {
|
||
"general.any.html": [
|
||
"Privileged header not allowed for guard type: request-no-cors",
|
||
"Fetch with range header will be sent with Accept-Encoding: identity"
|
||
],
|
||
"general.any.worker.html": [
|
||
"Privileged header not allowed for guard type: request-no-cors",
|
||
"Fetch with range header will be sent with Accept-Encoding: identity"
|
||
],
|
||
"general.window.html": [
|
||
"Script executed from partial response",
|
||
"Fetch with range header will be sent with Accept-Encoding: identity"
|
||
]
|
||
}
|
||
},
|
||
"FileAPI": {
|
||
"blob": {
|
||
"Blob-array-buffer.any.html": true,
|
||
"Blob-array-buffer.any.worker.html": true,
|
||
"Blob-constructor.any.html": true,
|
||
"Blob-constructor.any.worker.html": true,
|
||
"Blob-slice-overflow.any.html": true,
|
||
"Blob-slice-overflow.any.worker.html": true,
|
||
"Blob-slice.any.html": true,
|
||
"Blob-slice.any.worker.html": true,
|
||
"Blob-stream.any.html": true,
|
||
"Blob-stream.any.worker.html": true,
|
||
"Blob-text.any.html": true,
|
||
"Blob-text.any.worker.html": true,
|
||
"Blob-in-worker.worker.html": true
|
||
},
|
||
"file": {
|
||
"File-constructor.any.html": true,
|
||
"File-constructor.any.worker.html": false,
|
||
"send-file-formdata-controls.any.html": true,
|
||
"send-file-formdata-controls.any.worker.html": true,
|
||
"send-file-formdata-punctuation.any.html": true,
|
||
"send-file-formdata-punctuation.any.worker.html": true,
|
||
"send-file-formdata-utf-8.any.html": true,
|
||
"send-file-formdata-utf-8.any.worker.html": true,
|
||
"send-file-formdata.any.html": true,
|
||
"send-file-formdata.any.worker.html": true,
|
||
"Worker-read-file-constructor.worker.html": true
|
||
},
|
||
"fileReader.any.html": true,
|
||
"fileReader.any.worker.html": true,
|
||
"url": {
|
||
"url-format.any.html": true,
|
||
"url-format.any.worker.html": true,
|
||
"url-with-fetch.any.html": true,
|
||
"url-with-fetch.any.worker.html": true
|
||
},
|
||
"reading-data-section": {
|
||
"Determining-Encoding.any.html": true,
|
||
"Determining-Encoding.any.worker.html": true,
|
||
"FileReader-event-handler-attributes.any.html": true,
|
||
"FileReader-event-handler-attributes.any.worker.html": true,
|
||
"FileReader-multiple-reads.any.html": true,
|
||
"FileReader-multiple-reads.any.worker.html": true,
|
||
"filereader_abort.any.html": true,
|
||
"filereader_abort.any.worker.html": true,
|
||
"filereader_error.any.html": true,
|
||
"filereader_error.any.worker.html": true,
|
||
"filereader_events.any.html": false,
|
||
"filereader_events.any.worker.html": false,
|
||
"filereader_readAsArrayBuffer.any.html": true,
|
||
"filereader_readAsArrayBuffer.any.worker.html": true,
|
||
"filereader_readAsBinaryString.any.html": true,
|
||
"filereader_readAsBinaryString.any.worker.html": true,
|
||
"filereader_readAsDataURL.any.html": true,
|
||
"filereader_readAsDataURL.any.worker.html": true,
|
||
"filereader_readAsText.any.html": true,
|
||
"filereader_readAsText.any.worker.html": true,
|
||
"filereader_readystate.any.html": true,
|
||
"filereader_readystate.any.worker.html": true,
|
||
"filereader_result.any.html": true,
|
||
"filereader_result.any.worker.html": true
|
||
},
|
||
"idlharness.any.html": [
|
||
"FileList interface: existence and properties of interface object",
|
||
"FileList interface object length",
|
||
"FileList interface object name",
|
||
"FileList interface: existence and properties of interface prototype object",
|
||
"FileList interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"FileList interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"FileList interface: operation item(unsigned long)",
|
||
"FileList interface: attribute length"
|
||
],
|
||
"idlharness.any.worker.html": [
|
||
"FileList interface: existence and properties of interface object",
|
||
"FileList interface object length",
|
||
"FileList interface object name",
|
||
"FileList interface: existence and properties of interface prototype object",
|
||
"FileList interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"FileList interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"FileList interface: operation item(unsigned long)",
|
||
"FileList interface: attribute length",
|
||
"FileReaderSync interface: existence and properties of interface object",
|
||
"FileReaderSync interface object length",
|
||
"FileReaderSync interface object name",
|
||
"FileReaderSync interface: existence and properties of interface prototype object",
|
||
"FileReaderSync interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"FileReaderSync interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"FileReaderSync interface: operation readAsArrayBuffer(Blob)",
|
||
"FileReaderSync interface: operation readAsBinaryString(Blob)",
|
||
"FileReaderSync interface: operation readAsText(Blob, optional DOMString)",
|
||
"FileReaderSync interface: operation readAsDataURL(Blob)"
|
||
],
|
||
"FileReaderSync.worker.html": false,
|
||
"idlharness.worker.html": [
|
||
"FileList interface: existence and properties of interface object",
|
||
"FileList interface object length",
|
||
"FileList interface object name",
|
||
"FileList interface: existence and properties of interface prototype object",
|
||
"FileList interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"FileList interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"FileList interface: operation item(unsigned long)",
|
||
"FileList interface: attribute length",
|
||
"FileReaderSync interface: existence and properties of interface object",
|
||
"FileReaderSync interface object length",
|
||
"FileReaderSync interface object name",
|
||
"FileReaderSync interface: existence and properties of interface prototype object",
|
||
"FileReaderSync interface: existence and properties of interface prototype object's \"constructor\" property",
|
||
"FileReaderSync interface: existence and properties of interface prototype object's @@unscopables property",
|
||
"FileReaderSync interface: operation readAsArrayBuffer(Blob)",
|
||
"FileReaderSync interface: operation readAsBinaryString(Blob)",
|
||
"FileReaderSync interface: operation readAsText(Blob, optional DOMString)",
|
||
"FileReaderSync interface: operation readAsDataURL(Blob)",
|
||
"FileReaderSync must be primary interface of new FileReaderSync()",
|
||
"Stringification of new FileReaderSync()",
|
||
"FileReaderSync interface: new FileReaderSync() must inherit property \"readAsArrayBuffer(Blob)\" with the proper type",
|
||
"FileReaderSync interface: calling readAsArrayBuffer(Blob) on new FileReaderSync() with too few arguments must throw TypeError",
|
||
"FileReaderSync interface: new FileReaderSync() must inherit property \"readAsBinaryString(Blob)\" with the proper type",
|
||
"FileReaderSync interface: calling readAsBinaryString(Blob) on new FileReaderSync() with too few arguments must throw TypeError",
|
||
"FileReaderSync interface: new FileReaderSync() must inherit property \"readAsText(Blob, optional DOMString)\" with the proper type",
|
||
"FileReaderSync interface: calling readAsText(Blob, optional DOMString) on new FileReaderSync() with too few arguments must throw TypeError",
|
||
"FileReaderSync interface: new FileReaderSync() must inherit property \"readAsDataURL(Blob)\" with the proper type",
|
||
"FileReaderSync interface: calling readAsDataURL(Blob) on new FileReaderSync() with too few arguments must throw TypeError"
|
||
]
|
||
},
|
||
"html": {
|
||
"semantics": {
|
||
"scripting-1": {
|
||
"the-script-element": {
|
||
"import-assertions": {
|
||
"dynamic-import-with-assertion-argument.any.html": [
|
||
"Dynamic import with an unsupported type assertion should fail"
|
||
],
|
||
"dynamic-import-with-assertion-argument.any.worker.html": [
|
||
"Dynamic import with an unsupported type assertion should fail"
|
||
]
|
||
},
|
||
"json-module": {
|
||
"charset-bom.any.html": [
|
||
"UTF-8 BOM should be stripped when decoding JSON module script",
|
||
"UTF-16BE BOM should result in parse error in JSON module script",
|
||
"UTF-16LE BOM should result in parse error in JSON module script"
|
||
],
|
||
"charset-bom.any.worker.html": [
|
||
"UTF-8 BOM should be stripped when decoding JSON module script",
|
||
"UTF-16BE BOM should result in parse error in JSON module script",
|
||
"UTF-16LE BOM should result in parse error in JSON module script"
|
||
],
|
||
"invalid-content-type.any.html": true,
|
||
"invalid-content-type.any.worker.html": true,
|
||
"non-object.any.html": [
|
||
"Non-object: null",
|
||
"Non-object: true",
|
||
"Non-object: false",
|
||
"Non-object: string",
|
||
"Non-object: array"
|
||
],
|
||
"non-object.any.worker.html": [
|
||
"Non-object: null",
|
||
"Non-object: true",
|
||
"Non-object: false",
|
||
"Non-object: string",
|
||
"Non-object: array"
|
||
],
|
||
"repeated-imports.any.html": [
|
||
"Importing a specifier that previously failed due to an incorrect type assertion can succeed if the correct assertion is later given",
|
||
"Importing a specifier that previously succeeded with the correct type assertion should fail if the incorrect assertion is later given",
|
||
"Two modules of different type with the same specifier can load if the server changes its responses",
|
||
"If an import previously succeeded for a given specifier/type assertion pair, future uses of that pair should yield the same result"
|
||
],
|
||
"repeated-imports.any.worker.html": [
|
||
"Importing a specifier that previously failed due to an incorrect type assertion can succeed if the correct assertion is later given",
|
||
"Importing a specifier that previously succeeded with the correct type assertion should fail if the incorrect assertion is later given",
|
||
"Two modules of different type with the same specifier can load if the server changes its responses",
|
||
"If an import previously succeeded for a given specifier/type assertion pair, future uses of that pair should yield the same result"
|
||
]
|
||
},
|
||
"microtasks": {
|
||
"checkpoint-importScripts.any.worker.html": true
|
||
},
|
||
"module": {
|
||
"dynamic-import": {
|
||
"blob-url.any.html": [
|
||
"Revoking a blob URL immediately after calling import will not fail"
|
||
],
|
||
"blob-url.any.worker.html": [
|
||
"Revoking a blob URL immediately after calling import will not fail"
|
||
],
|
||
"blob-url.any.worker-module.html": [
|
||
"Revoking a blob URL immediately after calling import will not fail"
|
||
]
|
||
},
|
||
"import-meta": {
|
||
"import-meta-url.any.worker-module.html": true
|
||
}
|
||
}
|
||
}
|
||
}
|
||
},
|
||
"webappapis": {
|
||
"atob": {
|
||
"base64.any.html": true,
|
||
"base64.any.worker.html": true
|
||
},
|
||
"timers": {
|
||
"cleartimeout-clearinterval.any.html": true,
|
||
"cleartimeout-clearinterval.any.worker.html": true,
|
||
"missing-timeout-setinterval.any.html": true,
|
||
"missing-timeout-setinterval.any.worker.html": true,
|
||
"negative-setinterval.any.html": true,
|
||
"negative-setinterval.any.worker.html": true,
|
||
"negative-settimeout.any.html": true,
|
||
"negative-settimeout.any.worker.html": true,
|
||
"type-long-setinterval.any.html": true,
|
||
"type-long-setinterval.any.worker.html": true,
|
||
"type-long-settimeout.any.html": true,
|
||
"type-long-settimeout.any.worker.html": true
|
||
},
|
||
"microtask-queuing": {
|
||
"queue-microtask-exceptions.any.html": false,
|
||
"queue-microtask.any.html": true,
|
||
"queue-microtask.any.worker.html": true
|
||
},
|
||
"scripting": {
|
||
"reporterror.any.html": [
|
||
"self.reportError(1)",
|
||
"self.reportError(TypeError)",
|
||
"self.reportError(undefined)"
|
||
],
|
||
"reporterror.any.worker.html": [
|
||
"self.reportError(1)",
|
||
"self.reportError(TypeError)",
|
||
"self.reportError(undefined)"
|
||
]
|
||
},
|
||
"structured-clone": {
|
||
"structured-clone.any.html": [
|
||
"Blob basic",
|
||
"Blob unpaired high surrogate (invalid utf-8)",
|
||
"Blob unpaired low surrogate (invalid utf-8)",
|
||
"Blob paired surrogates (invalid utf-8)",
|
||
"Blob empty",
|
||
"Blob NUL",
|
||
"File basic",
|
||
"Serializing a non-serializable platform object fails",
|
||
"An object whose interface is deleted from the global must still deserialize",
|
||
"A subclass instance will deserialize as its closest serializable superclass",
|
||
"A detached ArrayBuffer cannot be transferred",
|
||
"A detached platform object cannot be transferred",
|
||
"Transferring a non-transferable platform object fails",
|
||
"A subclass instance will be received as its closest transferable superclass"
|
||
],
|
||
"structured-clone.any.worker.html": [
|
||
"Blob basic",
|
||
"Blob unpaired high surrogate (invalid utf-8)",
|
||
"Blob unpaired low surrogate (invalid utf-8)",
|
||
"Blob paired surrogates (invalid utf-8)",
|
||
"Blob empty",
|
||
"Blob NUL",
|
||
"File basic",
|
||
"Serializing a non-serializable platform object fails",
|
||
"An object whose interface is deleted from the global must still deserialize",
|
||
"A subclass instance will deserialize as its closest serializable superclass",
|
||
"A detached ArrayBuffer cannot be transferred",
|
||
"A detached platform object cannot be transferred",
|
||
"Transferring a non-transferable platform object fails",
|
||
"A subclass instance will be received as its closest transferable superclass"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"webstorage": {
|
||
"defineProperty.window.html": true,
|
||
"set.window.html": true,
|
||
"storage_enumerate.window.html": true,
|
||
"storage_in.window.html": true,
|
||
"event_constructor.window.html": false,
|
||
"event_initstorageevent.window.html": false,
|
||
"missing_arguments.window.html": true,
|
||
"storage_builtins.window.html": true,
|
||
"storage_clear.window.html": true,
|
||
"storage_functions_not_overwritten.window.html": true,
|
||
"storage_getitem.window.html": true,
|
||
"storage_indexing.window.html": true,
|
||
"storage_key.window.html": true,
|
||
"storage_key_empty_string.window.html": true,
|
||
"storage_length.window.html": true,
|
||
"storage_local_setitem_quotaexceedederr.window.html": true,
|
||
"storage_removeitem.window.html": true,
|
||
"storage_session_setitem_quotaexceedederr.window.html": true,
|
||
"storage_set_value_enumerate.window.html": true,
|
||
"storage_setitem.window.html": [
|
||
"localStorage[] = \"\ud800\"",
|
||
"localStorage[] = \"\udbff\"",
|
||
"localStorage[] = \"\udc00\"",
|
||
"localStorage[] = \"\udfff\"",
|
||
"localStorage[] = \"\ud83ca\"",
|
||
"localStorage[] = \"a\udf4d\"",
|
||
"sessionStorage[] = \"\ud800\"",
|
||
"sessionStorage[] = \"\udbff\"",
|
||
"sessionStorage[] = \"\udc00\"",
|
||
"sessionStorage[] = \"\udfff\"",
|
||
"sessionStorage[] = \"\ud83ca\"",
|
||
"sessionStorage[] = \"a\udf4d\""
|
||
],
|
||
"storage_string_conversion.window.html": true,
|
||
"storage_supported_property_names.window.html": true,
|
||
"symbol-props.window.html": [
|
||
"localStorage: defineProperty not configurable",
|
||
"sessionStorage: defineProperty not configurable"
|
||
]
|
||
},
|
||
"webmessaging": {
|
||
"broadcastchannel": {
|
||
"basics.any.html": [
|
||
"postMessage results in correct event"
|
||
],
|
||
"basics.any.worker.html": [
|
||
"postMessage results in correct event"
|
||
],
|
||
"interface.any.html": true,
|
||
"interface.any.worker.html": true
|
||
},
|
||
"message-channels": {
|
||
"basics.any.html": true,
|
||
"basics.any.worker.html": true,
|
||
"close.any.html": true,
|
||
"close.any.worker.html": true,
|
||
"dictionary-transferrable.any.html": true,
|
||
"dictionary-transferrable.any.worker.html": true,
|
||
"implied-start.any.html": true,
|
||
"implied-start.any.worker.html": true,
|
||
"no-start.any.html": true,
|
||
"no-start.any.worker.html": true,
|
||
"user-activation.tentative.any.html": false,
|
||
"user-activation.tentative.any.worker.html": false,
|
||
"worker-post-after-close.any.html": false,
|
||
"worker.any.html": false
|
||
},
|
||
"Channel_postMessage_Blob.any.html": false,
|
||
"Channel_postMessage_Blob.any.worker.html": false,
|
||
"Channel_postMessage_DataCloneErr.any.html": true,
|
||
"Channel_postMessage_DataCloneErr.any.worker.html": true,
|
||
"Channel_postMessage_clone_port.any.html": true,
|
||
"Channel_postMessage_clone_port.any.worker.html": true,
|
||
"Channel_postMessage_clone_port_error.any.html": true,
|
||
"Channel_postMessage_clone_port_error.any.worker.html": true,
|
||
"Channel_postMessage_event_properties.any.html": true,
|
||
"Channel_postMessage_event_properties.any.worker.html": true,
|
||
"Channel_postMessage_ports_readonly_array.any.html": false,
|
||
"Channel_postMessage_ports_readonly_array.any.worker.html": false,
|
||
"Channel_postMessage_target_source.any.html": true,
|
||
"Channel_postMessage_target_source.any.worker.html": true,
|
||
"Channel_postMessage_transfer_xsite_incoming_messages.window.html": false,
|
||
"Channel_postMessage_with_transfer_entangled.any.html": true,
|
||
"Channel_postMessage_with_transfer_entangled.any.worker.html": true,
|
||
"Channel_postMessage_with_transfer_incoming_messages.any.html": true,
|
||
"Channel_postMessage_with_transfer_incoming_messages.any.worker.html": true,
|
||
"Channel_postMessage_with_transfer_outgoing_messages.any.html": true,
|
||
"Channel_postMessage_with_transfer_outgoing_messages.any.worker.html": true,
|
||
"MessageEvent-trusted.any.html": false,
|
||
"MessageEvent-trusted.any.worker.html": false,
|
||
"MessageEvent-trusted.window.html": false,
|
||
"MessageEvent.any.html": true,
|
||
"MessageEvent.any.worker.html": true,
|
||
"MessagePort_initial_disabled.any.html": true,
|
||
"MessagePort_initial_disabled.any.worker.html": true,
|
||
"MessagePort_onmessage_start.any.html": true,
|
||
"MessagePort_onmessage_start.any.worker.html": true
|
||
},
|
||
"xhr": {
|
||
"formdata": {
|
||
"append.any.html": true,
|
||
"append.any.worker.html": true,
|
||
"constructor.any.html": true,
|
||
"constructor.any.worker.html": true,
|
||
"delete.any.html": true,
|
||
"delete.any.worker.html": true,
|
||
"foreach.any.html": true,
|
||
"foreach.any.worker.html": true,
|
||
"get.any.html": true,
|
||
"get.any.worker.html": true,
|
||
"has.any.html": true,
|
||
"has.any.worker.html": true,
|
||
"set-blob.any.html": true,
|
||
"set-blob.any.worker.html": true,
|
||
"set.any.html": true,
|
||
"set.any.worker.html": true
|
||
}
|
||
},
|
||
"websockets": {
|
||
"Close-1000-reason.any.html": true,
|
||
"Close-1000-reason.any.html?wpt_flags=h2": false,
|
||
"Close-1000-reason.any.html?wss": true,
|
||
"Close-1000-reason.any.worker.html": true,
|
||
"Close-1000-reason.any.worker.html?wpt_flags=h2": false,
|
||
"Close-1000-reason.any.worker.html?wss": true,
|
||
"Close-1000-verify-code.any.html": true,
|
||
"Close-1000-verify-code.any.html?wpt_flags=h2": false,
|
||
"Close-1000-verify-code.any.html?wss": true,
|
||
"Close-1000-verify-code.any.worker.html": true,
|
||
"Close-1000-verify-code.any.worker.html?wpt_flags=h2": false,
|
||
"Close-1000-verify-code.any.worker.html?wss": true,
|
||
"Close-1000.any.html": true,
|
||
"Close-1000.any.html?wpt_flags=h2": false,
|
||
"Close-1000.any.html?wss": true,
|
||
"Close-1000.any.worker.html": true,
|
||
"Close-1000.any.worker.html?wpt_flags=h2": false,
|
||
"Close-1000.any.worker.html?wss": true,
|
||
"Close-1005-verify-code.any.html": true,
|
||
"Close-1005-verify-code.any.html?wpt_flags=h2": false,
|
||
"Close-1005-verify-code.any.html?wss": true,
|
||
"Close-1005-verify-code.any.worker.html": true,
|
||
"Close-1005-verify-code.any.worker.html?wpt_flags=h2": false,
|
||
"Close-1005-verify-code.any.worker.html?wss": true,
|
||
"Close-1005.any.html": true,
|
||
"Close-1005.any.html?wpt_flags=h2": false,
|
||
"Close-1005.any.html?wss": true,
|
||
"Close-1005.any.worker.html": true,
|
||
"Close-1005.any.worker.html?wpt_flags=h2": false,
|
||
"Close-1005.any.worker.html?wss": true,
|
||
"Close-2999-reason.any.html": true,
|
||
"Close-2999-reason.any.html?wpt_flags=h2": false,
|
||
"Close-2999-reason.any.html?wss": true,
|
||
"Close-2999-reason.any.worker.html": true,
|
||
"Close-2999-reason.any.worker.html?wpt_flags=h2": false,
|
||
"Close-2999-reason.any.worker.html?wss": true,
|
||
"Close-3000-reason.any.html": true,
|
||
"Close-3000-reason.any.html?wpt_flags=h2": false,
|
||
"Close-3000-reason.any.html?wss": true,
|
||
"Close-3000-reason.any.worker.html": true,
|
||
"Close-3000-reason.any.worker.html?wpt_flags=h2": false,
|
||
"Close-3000-reason.any.worker.html?wss": true,
|
||
"Close-3000-verify-code.any.html": true,
|
||
"Close-3000-verify-code.any.html?wpt_flags=h2": false,
|
||
"Close-3000-verify-code.any.html?wss": true,
|
||
"Close-3000-verify-code.any.worker.html": true,
|
||
"Close-3000-verify-code.any.worker.html?wpt_flags=h2": false,
|
||
"Close-3000-verify-code.any.worker.html?wss": true,
|
||
"Close-4999-reason.any.html": true,
|
||
"Close-4999-reason.any.html?wpt_flags=h2": false,
|
||
"Close-4999-reason.any.html?wss": true,
|
||
"Close-4999-reason.any.worker.html": true,
|
||
"Close-4999-reason.any.worker.html?wpt_flags=h2": false,
|
||
"Close-4999-reason.any.worker.html?wss": true,
|
||
"Close-Reason-124Bytes.any.html": true,
|
||
"Close-Reason-124Bytes.any.html?wpt_flags=h2": false,
|
||
"Close-Reason-124Bytes.any.html?wss": true,
|
||
"Close-Reason-124Bytes.any.worker.html": true,
|
||
"Close-Reason-124Bytes.any.worker.html?wpt_flags=h2": false,
|
||
"Close-Reason-124Bytes.any.worker.html?wss": true,
|
||
"Close-onlyReason.any.html": true,
|
||
"Close-onlyReason.any.html?wpt_flags=h2": false,
|
||
"Close-onlyReason.any.html?wss": true,
|
||
"Close-onlyReason.any.worker.html": true,
|
||
"Close-onlyReason.any.worker.html?wpt_flags=h2": false,
|
||
"Close-onlyReason.any.worker.html?wss": true,
|
||
"Close-readyState-Closed.any.html": true,
|
||
"Close-readyState-Closed.any.html?wpt_flags=h2": false,
|
||
"Close-readyState-Closed.any.html?wss": true,
|
||
"Close-readyState-Closed.any.worker.html": true,
|
||
"Close-readyState-Closed.any.worker.html?wpt_flags=h2": false,
|
||
"Close-readyState-Closed.any.worker.html?wss": true,
|
||
"Close-readyState-Closing.any.html": true,
|
||
"Close-readyState-Closing.any.html?wpt_flags=h2": false,
|
||
"Close-readyState-Closing.any.html?wss": true,
|
||
"Close-readyState-Closing.any.worker.html": true,
|
||
"Close-readyState-Closing.any.worker.html?wpt_flags=h2": false,
|
||
"Close-readyState-Closing.any.worker.html?wss": true,
|
||
"Close-reason-unpaired-surrogates.any.html": true,
|
||
"Close-reason-unpaired-surrogates.any.html?wpt_flags=h2": false,
|
||
"Close-reason-unpaired-surrogates.any.html?wss": true,
|
||
"Close-reason-unpaired-surrogates.any.worker.html": true,
|
||
"Close-reason-unpaired-surrogates.any.worker.html?wpt_flags=h2": false,
|
||
"Close-reason-unpaired-surrogates.any.worker.html?wss": true,
|
||
"Close-server-initiated-close.any.html": true,
|
||
"Close-server-initiated-close.any.html?wpt_flags=h2": false,
|
||
"Close-server-initiated-close.any.html?wss": true,
|
||
"Close-server-initiated-close.any.worker.html": true,
|
||
"Close-server-initiated-close.any.worker.html?wpt_flags=h2": false,
|
||
"Close-server-initiated-close.any.worker.html?wss": true,
|
||
"Close-undefined.any.html": true,
|
||
"Close-undefined.any.html?wpt_flags=h2": false,
|
||
"Close-undefined.any.html?wss": true,
|
||
"Close-undefined.any.worker.html": true,
|
||
"Close-undefined.any.worker.html?wpt_flags=h2": false,
|
||
"Close-undefined.any.worker.html?wss": true,
|
||
"Create-asciiSep-protocol-string.any.html": true,
|
||
"Create-asciiSep-protocol-string.any.html?wpt_flags=h2": true,
|
||
"Create-asciiSep-protocol-string.any.html?wss": true,
|
||
"Create-asciiSep-protocol-string.any.worker.html": true,
|
||
"Create-asciiSep-protocol-string.any.worker.html?wpt_flags=h2": true,
|
||
"Create-asciiSep-protocol-string.any.worker.html?wss": true,
|
||
"Create-blocked-port.any.html": true,
|
||
"Create-blocked-port.any.html?wpt_flags=h2": [
|
||
"Basic check"
|
||
],
|
||
"Create-blocked-port.any.html?wss": true,
|
||
"Create-blocked-port.any.worker.html": true,
|
||
"Create-blocked-port.any.worker.html?wpt_flags=h2": [
|
||
"Basic check"
|
||
],
|
||
"Create-blocked-port.any.worker.html?wss": true,
|
||
"Create-extensions-empty.any.html": true,
|
||
"Create-extensions-empty.any.html?wpt_flags=h2": false,
|
||
"Create-extensions-empty.any.html?wss": true,
|
||
"Create-extensions-empty.any.worker.html": true,
|
||
"Create-extensions-empty.any.worker.html?wpt_flags=h2": false,
|
||
"Create-extensions-empty.any.worker.html?wss": true,
|
||
"Create-invalid-urls.any.html": true,
|
||
"Create-invalid-urls.any.html?wpt_flags=h2": true,
|
||
"Create-invalid-urls.any.html?wss": true,
|
||
"Create-invalid-urls.any.worker.html": true,
|
||
"Create-invalid-urls.any.worker.html?wpt_flags=h2": true,
|
||
"Create-invalid-urls.any.worker.html?wss": true,
|
||
"Create-non-absolute-url.any.html": true,
|
||
"Create-non-absolute-url.any.html?wpt_flags=h2": true,
|
||
"Create-non-absolute-url.any.html?wss": true,
|
||
"Create-non-absolute-url.any.worker.html": true,
|
||
"Create-non-absolute-url.any.worker.html?wpt_flags=h2": true,
|
||
"Create-non-absolute-url.any.worker.html?wss": true,
|
||
"Create-nonAscii-protocol-string.any.html": true,
|
||
"Create-nonAscii-protocol-string.any.html?wpt_flags=h2": true,
|
||
"Create-nonAscii-protocol-string.any.html?wss": true,
|
||
"Create-nonAscii-protocol-string.any.worker.html": true,
|
||
"Create-nonAscii-protocol-string.any.worker.html?wpt_flags=h2": true,
|
||
"Create-nonAscii-protocol-string.any.worker.html?wss": true,
|
||
"Create-on-worker-shutdown.any.html": false,
|
||
"Create-protocol-with-space.any.html": true,
|
||
"Create-protocol-with-space.any.html?wpt_flags=h2": true,
|
||
"Create-protocol-with-space.any.html?wss": true,
|
||
"Create-protocol-with-space.any.worker.html": true,
|
||
"Create-protocol-with-space.any.worker.html?wpt_flags=h2": true,
|
||
"Create-protocol-with-space.any.worker.html?wss": true,
|
||
"Create-protocols-repeated-case-insensitive.any.html": true,
|
||
"Create-protocols-repeated-case-insensitive.any.html?wpt_flags=h2": true,
|
||
"Create-protocols-repeated-case-insensitive.any.html?wss": true,
|
||
"Create-protocols-repeated-case-insensitive.any.worker.html": true,
|
||
"Create-protocols-repeated-case-insensitive.any.worker.html?wpt_flags=h2": true,
|
||
"Create-protocols-repeated-case-insensitive.any.worker.html?wss": true,
|
||
"Create-protocols-repeated.any.html": true,
|
||
"Create-protocols-repeated.any.html?wpt_flags=h2": true,
|
||
"Create-protocols-repeated.any.html?wss": true,
|
||
"Create-protocols-repeated.any.worker.html": true,
|
||
"Create-protocols-repeated.any.worker.html?wpt_flags=h2": true,
|
||
"Create-protocols-repeated.any.worker.html?wss": true,
|
||
"Create-url-with-space.any.html": true,
|
||
"Create-url-with-space.any.html?wpt_flags=h2": true,
|
||
"Create-url-with-space.any.html?wss": true,
|
||
"Create-url-with-space.any.worker.html": true,
|
||
"Create-url-with-space.any.worker.html?wpt_flags=h2": true,
|
||
"Create-url-with-space.any.worker.html?wss": true,
|
||
"Create-valid-url-array-protocols.any.html": true,
|
||
"Create-valid-url-array-protocols.any.html?wpt_flags=h2": false,
|
||
"Create-valid-url-array-protocols.any.html?wss": true,
|
||
"Create-valid-url-array-protocols.any.worker.html": true,
|
||
"Create-valid-url-array-protocols.any.worker.html?wpt_flags=h2": false,
|
||
"Create-valid-url-array-protocols.any.worker.html?wss": true,
|
||
"Create-valid-url-binaryType-blob.any.html": true,
|
||
"Create-valid-url-binaryType-blob.any.html?wpt_flags=h2": false,
|
||
"Create-valid-url-binaryType-blob.any.html?wss": true,
|
||
"Create-valid-url-binaryType-blob.any.worker.html": true,
|
||
"Create-valid-url-binaryType-blob.any.worker.html?wpt_flags=h2": false,
|
||
"Create-valid-url-binaryType-blob.any.worker.html?wss": true,
|
||
"Create-valid-url-protocol-empty.any.html": true,
|
||
"Create-valid-url-protocol-empty.any.html?wpt_flags=h2": true,
|
||
"Create-valid-url-protocol-empty.any.html?wss": true,
|
||
"Create-valid-url-protocol-empty.any.worker.html": true,
|
||
"Create-valid-url-protocol-empty.any.worker.html?wpt_flags=h2": true,
|
||
"Create-valid-url-protocol-empty.any.worker.html?wss": true,
|
||
"Create-valid-url-protocol-setCorrectly.any.html": true,
|
||
"Create-valid-url-protocol-setCorrectly.any.html?wpt_flags=h2": false,
|
||
"Create-valid-url-protocol-setCorrectly.any.html?wss": true,
|
||
"Create-valid-url-protocol-setCorrectly.any.worker.html": true,
|
||
"Create-valid-url-protocol-setCorrectly.any.worker.html?wpt_flags=h2": false,
|
||
"Create-valid-url-protocol-setCorrectly.any.worker.html?wss": true,
|
||
"Create-valid-url-protocol-string.any.html": true,
|
||
"Create-valid-url-protocol-string.any.html?wpt_flags=h2": false,
|
||
"Create-valid-url-protocol-string.any.html?wss": true,
|
||
"Create-valid-url-protocol-string.any.worker.html": true,
|
||
"Create-valid-url-protocol-string.any.worker.html?wpt_flags=h2": false,
|
||
"Create-valid-url-protocol-string.any.worker.html?wss": true,
|
||
"Create-valid-url-protocol.any.html": true,
|
||
"Create-valid-url-protocol.any.html?wpt_flags=h2": false,
|
||
"Create-valid-url-protocol.any.html?wss": true,
|
||
"Create-valid-url-protocol.any.worker.html": true,
|
||
"Create-valid-url-protocol.any.worker.html?wpt_flags=h2": false,
|
||
"Create-valid-url-protocol.any.worker.html?wss": true,
|
||
"Create-valid-url.any.html": true,
|
||
"Create-valid-url.any.html?wpt_flags=h2": false,
|
||
"Create-valid-url.any.html?wss": true,
|
||
"Create-valid-url.any.worker.html": true,
|
||
"Create-valid-url.any.worker.html?wpt_flags=h2": false,
|
||
"Create-valid-url.any.worker.html?wss": true,
|
||
"Create-wrong-scheme.any.html": true,
|
||
"Create-wrong-scheme.any.html?wpt_flags=h2": true,
|
||
"Create-wrong-scheme.any.html?wss": true,
|
||
"Create-wrong-scheme.any.worker.html": true,
|
||
"Create-wrong-scheme.any.worker.html?wpt_flags=h2": true,
|
||
"Create-wrong-scheme.any.worker.html?wss": true,
|
||
"Send-0byte-data.any.html": true,
|
||
"Send-0byte-data.any.html?wpt_flags=h2": false,
|
||
"Send-0byte-data.any.html?wss": true,
|
||
"Send-0byte-data.any.worker.html": true,
|
||
"Send-0byte-data.any.worker.html?wpt_flags=h2": false,
|
||
"Send-0byte-data.any.worker.html?wss": true,
|
||
"Send-65K-data.any.html": true,
|
||
"Send-65K-data.any.html?wpt_flags=h2": false,
|
||
"Send-65K-data.any.html?wss": true,
|
||
"Send-65K-data.any.worker.html": true,
|
||
"Send-65K-data.any.worker.html?wpt_flags=h2": false,
|
||
"Send-65K-data.any.worker.html?wss": true,
|
||
"Send-before-open.any.html": true,
|
||
"Send-before-open.any.html?wpt_flags=h2": true,
|
||
"Send-before-open.any.html?wss": true,
|
||
"Send-before-open.any.worker.html": true,
|
||
"Send-before-open.any.worker.html?wpt_flags=h2": true,
|
||
"Send-before-open.any.worker.html?wss": true,
|
||
"Send-binary-65K-arraybuffer.any.html": true,
|
||
"Send-binary-65K-arraybuffer.any.html?wpt_flags=h2": false,
|
||
"Send-binary-65K-arraybuffer.any.html?wss": true,
|
||
"Send-binary-65K-arraybuffer.any.worker.html": true,
|
||
"Send-binary-65K-arraybuffer.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-65K-arraybuffer.any.worker.html?wss": true,
|
||
"Send-binary-arraybuffer.any.html": true,
|
||
"Send-binary-arraybuffer.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybuffer.any.html?wss": true,
|
||
"Send-binary-arraybuffer.any.worker.html": true,
|
||
"Send-binary-arraybuffer.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybuffer.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-float32.any.html": true,
|
||
"Send-binary-arraybufferview-float32.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-float32.any.html?wss": true,
|
||
"Send-binary-arraybufferview-float32.any.worker.html": true,
|
||
"Send-binary-arraybufferview-float32.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-float32.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-float64.any.html": true,
|
||
"Send-binary-arraybufferview-float64.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-float64.any.html?wss": true,
|
||
"Send-binary-arraybufferview-float64.any.worker.html": true,
|
||
"Send-binary-arraybufferview-float64.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-float64.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-int16-offset.any.html": true,
|
||
"Send-binary-arraybufferview-int16-offset.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-int16-offset.any.html?wss": true,
|
||
"Send-binary-arraybufferview-int16-offset.any.worker.html": true,
|
||
"Send-binary-arraybufferview-int16-offset.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-int16-offset.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-int32.any.html": true,
|
||
"Send-binary-arraybufferview-int32.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-int32.any.html?wss": true,
|
||
"Send-binary-arraybufferview-int32.any.worker.html": true,
|
||
"Send-binary-arraybufferview-int32.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-int32.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-int8.any.html": true,
|
||
"Send-binary-arraybufferview-int8.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-int8.any.html?wss": true,
|
||
"Send-binary-arraybufferview-int8.any.worker.html": true,
|
||
"Send-binary-arraybufferview-int8.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-int8.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-uint16-offset-length.any.html": true,
|
||
"Send-binary-arraybufferview-uint16-offset-length.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-uint16-offset-length.any.html?wss": true,
|
||
"Send-binary-arraybufferview-uint16-offset-length.any.worker.html": true,
|
||
"Send-binary-arraybufferview-uint16-offset-length.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-uint16-offset-length.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-uint32-offset.any.html": true,
|
||
"Send-binary-arraybufferview-uint32-offset.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-uint32-offset.any.html?wss": true,
|
||
"Send-binary-arraybufferview-uint32-offset.any.worker.html": true,
|
||
"Send-binary-arraybufferview-uint32-offset.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-uint32-offset.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-uint8-offset-length.any.html": true,
|
||
"Send-binary-arraybufferview-uint8-offset-length.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-uint8-offset-length.any.html?wss": true,
|
||
"Send-binary-arraybufferview-uint8-offset-length.any.worker.html": true,
|
||
"Send-binary-arraybufferview-uint8-offset-length.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-uint8-offset-length.any.worker.html?wss": true,
|
||
"Send-binary-arraybufferview-uint8-offset.any.html": true,
|
||
"Send-binary-arraybufferview-uint8-offset.any.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-uint8-offset.any.html?wss": true,
|
||
"Send-binary-arraybufferview-uint8-offset.any.worker.html": true,
|
||
"Send-binary-arraybufferview-uint8-offset.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-arraybufferview-uint8-offset.any.worker.html?wss": true,
|
||
"Send-binary-blob.any.html": true,
|
||
"Send-binary-blob.any.html?wpt_flags=h2": false,
|
||
"Send-binary-blob.any.html?wss": true,
|
||
"Send-binary-blob.any.worker.html": true,
|
||
"Send-binary-blob.any.worker.html?wpt_flags=h2": false,
|
||
"Send-binary-blob.any.worker.html?wss": true,
|
||
"Send-data.any.html": true,
|
||
"Send-data.any.html?wpt_flags=h2": false,
|
||
"Send-data.any.html?wss": true,
|
||
"Send-data.any.worker.html": true,
|
||
"Send-data.any.worker.html?wpt_flags=h2": false,
|
||
"Send-data.any.worker.html?wss": true,
|
||
"Send-null.any.html": true,
|
||
"Send-null.any.html?wpt_flags=h2": false,
|
||
"Send-null.any.html?wss": true,
|
||
"Send-null.any.worker.html": true,
|
||
"Send-null.any.worker.html?wpt_flags=h2": false,
|
||
"Send-null.any.worker.html?wss": true,
|
||
"Send-paired-surrogates.any.html": true,
|
||
"Send-paired-surrogates.any.html?wpt_flags=h2": false,
|
||
"Send-paired-surrogates.any.html?wss": true,
|
||
"Send-paired-surrogates.any.worker.html": true,
|
||
"Send-paired-surrogates.any.worker.html?wpt_flags=h2": false,
|
||
"Send-paired-surrogates.any.worker.html?wss": true,
|
||
"Send-unicode-data.any.html": true,
|
||
"Send-unicode-data.any.html?wpt_flags=h2": false,
|
||
"Send-unicode-data.any.html?wss": true,
|
||
"Send-unicode-data.any.worker.html": true,
|
||
"Send-unicode-data.any.worker.html?wpt_flags=h2": false,
|
||
"Send-unicode-data.any.worker.html?wss": true,
|
||
"Send-unpaired-surrogates.any.html": true,
|
||
"Send-unpaired-surrogates.any.html?wpt_flags=h2": false,
|
||
"Send-unpaired-surrogates.any.html?wss": true,
|
||
"Send-unpaired-surrogates.any.worker.html": true,
|
||
"Send-unpaired-surrogates.any.worker.html?wpt_flags=h2": false,
|
||
"Send-unpaired-surrogates.any.worker.html?wss": true,
|
||
"basic-auth.any.html?wpt_flags=h2": false,
|
||
"basic-auth.any.html?wss": false,
|
||
"basic-auth.any.worker.html?wpt_flags=h2": false,
|
||
"basic-auth.any.worker.html?wss": false,
|
||
"binaryType-wrong-value.any.html": true,
|
||
"binaryType-wrong-value.any.html?wpt_flags=h2": false,
|
||
"binaryType-wrong-value.any.html?wss": true,
|
||
"binaryType-wrong-value.any.worker.html": true,
|
||
"binaryType-wrong-value.any.worker.html?wpt_flags=h2": false,
|
||
"binaryType-wrong-value.any.worker.html?wss": true,
|
||
"bufferedAmount-unchanged-by-sync-xhr.any.html": false,
|
||
"bufferedAmount-unchanged-by-sync-xhr.any.html?wpt_flags=h2": false,
|
||
"bufferedAmount-unchanged-by-sync-xhr.any.html?wss": false,
|
||
"bufferedAmount-unchanged-by-sync-xhr.any.worker.html": false,
|
||
"bufferedAmount-unchanged-by-sync-xhr.any.worker.html?wpt_flags=h2": false,
|
||
"bufferedAmount-unchanged-by-sync-xhr.any.worker.html?wss": false,
|
||
"close-invalid.any.html": true,
|
||
"close-invalid.any.html?wpt_flags=h2": true,
|
||
"close-invalid.any.html?wss": true,
|
||
"close-invalid.any.worker.html": true,
|
||
"close-invalid.any.worker.html?wpt_flags=h2": true,
|
||
"close-invalid.any.worker.html?wss": true,
|
||
"constructor.any.html": true,
|
||
"constructor.any.html?wpt_flags=h2": true,
|
||
"constructor.any.html?wss": true,
|
||
"constructor.any.worker.html": true,
|
||
"constructor.any.worker.html?wpt_flags=h2": true,
|
||
"constructor.any.worker.html?wss": true,
|
||
"eventhandlers.any.html": true,
|
||
"eventhandlers.any.html?wpt_flags=h2": true,
|
||
"eventhandlers.any.html?wss": true,
|
||
"eventhandlers.any.worker.html": true,
|
||
"eventhandlers.any.worker.html?wpt_flags=h2": true,
|
||
"eventhandlers.any.worker.html?wss": true,
|
||
"referrer.any.html": true,
|
||
"referrer.any.worker.html": true,
|
||
"Close-delayed.any.html": false,
|
||
"Close-delayed.any.html?wpt_flags=h2": false,
|
||
"Close-delayed.any.html?wss": false,
|
||
"Close-delayed.any.worker.html": false,
|
||
"Close-delayed.any.worker.html?wpt_flags=h2": false,
|
||
"Close-delayed.any.worker.html?wss": false,
|
||
"stream": {
|
||
"tentative": {
|
||
"abort.any.html?wss": true,
|
||
"abort.any.worker.html?wss": true,
|
||
"backpressure-receive.any.html?wpt_flags=h2": false,
|
||
"backpressure-receive.any.html?wss": true,
|
||
"backpressure-receive.any.worker.html?wpt_flags=h2": false,
|
||
"backpressure-receive.any.worker.html?wss": true,
|
||
"backpressure-send.any.html?wpt_flags=h2": false,
|
||
"backpressure-send.any.html?wss": true,
|
||
"backpressure-send.any.worker.html?wpt_flags=h2": false,
|
||
"backpressure-send.any.worker.html?wss": true,
|
||
"close.any.html?wpt_flags=h2": false,
|
||
"close.any.html?wss": true,
|
||
"close.any.worker.html?wpt_flags=h2": false,
|
||
"close.any.worker.html?wss": true,
|
||
"constructor.any.html?wpt_flags=h2": false,
|
||
"constructor.any.html?wss": true,
|
||
"constructor.any.worker.html?wpt_flags=h2": false,
|
||
"constructor.any.worker.html?wss": true
|
||
}
|
||
},
|
||
"opening-handshake": {
|
||
"003-sets-origin.worker.html": false
|
||
}
|
||
},
|
||
"workers": {
|
||
"Worker-base64.any.worker.html": true,
|
||
"Worker-call.worker.html": true,
|
||
"Worker-constructor-proto.any.worker.html": true,
|
||
"Worker-custom-event.any.worker.html": true,
|
||
"Worker-formdata.any.worker.html": [
|
||
"Test FormData interface object"
|
||
],
|
||
"Worker-location.sub.any.worker.html": [
|
||
"Test WorkerLocation properties."
|
||
],
|
||
"Worker-replace-event-handler.any.worker.html": true,
|
||
"Worker-replace-global-constructor.any.worker.html": true,
|
||
"Worker-replace-self.any.worker.html": true,
|
||
"WorkerGlobalScope_requestAnimationFrame.tentative.worker.html": [
|
||
"WorkerGlobalScope_requestAnimationFrame"
|
||
],
|
||
"WorkerLocation-origin.sub.window.html": [
|
||
"workerLocation.origin must use ASCII code points"
|
||
],
|
||
"WorkerNavigator-hardware-concurrency.any.worker.html": true,
|
||
"WorkerNavigator.any.worker.html": [
|
||
"Testing Navigator properties on workers."
|
||
],
|
||
"constructors": {
|
||
"Worker": {
|
||
"DedicatedWorkerGlobalScope-members.worker.html": [
|
||
"existence of onoffline",
|
||
"existence of ononline"
|
||
],
|
||
"expected-self-properties.worker.html": [
|
||
"existence of XMLHttpRequest",
|
||
"existence of EventSource",
|
||
"existence of SharedWorker"
|
||
],
|
||
"unexpected-self-properties.worker.html": true
|
||
}
|
||
},
|
||
"dedicated-worker-from-blob-url.window.html": [
|
||
"Creating a dedicated worker from a blob URL works immediately before revoking."
|
||
],
|
||
"dedicated-worker-in-data-url-context.window.html": [
|
||
"Create a dedicated worker in a data url frame",
|
||
"Create a dedicated worker in a data url dedicated worker",
|
||
"Create a data url dedicated worker in a data url frame"
|
||
],
|
||
"examples": {
|
||
"general.any.worker.html": true,
|
||
"general.worker.html": true
|
||
},
|
||
"importscripts_mime.any.worker.html": [
|
||
"importScripts() requires scripty MIME types: text/ecmascript is allowed."
|
||
],
|
||
"interfaces": {
|
||
"DedicatedWorkerGlobalScope": {
|
||
"EventTarget.worker.html": true,
|
||
"onmessage.worker.html": true,
|
||
"postMessage": {
|
||
"return-value.worker.html": true
|
||
}
|
||
},
|
||
"WorkerGlobalScope": {
|
||
"location": {
|
||
"returns-same-object.any.worker.html": true
|
||
},
|
||
"self.any.worker.html": true
|
||
},
|
||
"WorkerUtils": {
|
||
"importScripts": {
|
||
"001.worker.html": true,
|
||
"002.worker.html": true,
|
||
"blob-url.worker.html": [
|
||
"A revoked blob URL will fail"
|
||
],
|
||
"catch.sub.any.worker.html": [
|
||
"Cross-origin syntax error",
|
||
"Cross-origin throw",
|
||
"Redirect-to-cross-origin syntax error",
|
||
"Redirect-to-Cross-origin throw"
|
||
],
|
||
"report-error-cross-origin.sub.any.worker.html": false,
|
||
"report-error-redirect-to-cross-origin.sub.any.worker.html": false,
|
||
"report-error-same-origin.sub.any.worker.html": false
|
||
}
|
||
}
|
||
},
|
||
"modules": {
|
||
"dedicated-worker-import-blob-url.any.html": true,
|
||
"dedicated-worker-import-blob-url.any.worker.html": true,
|
||
"dedicated-worker-import-data-url.any.html": true,
|
||
"dedicated-worker-import-data-url.any.worker.html": true,
|
||
"dedicated-worker-import.any.html": true,
|
||
"dedicated-worker-import.any.worker.html": true,
|
||
"shared-worker-import-blob-url.window.html": [
|
||
"Static import.",
|
||
"Static import (cross-origin).",
|
||
"Static import (redirect).",
|
||
"Nested static import.",
|
||
"Static import and then dynamic import.",
|
||
"Dynamic import.",
|
||
"Nested dynamic import.",
|
||
"Dynamic import and then static import.",
|
||
"eval(import())."
|
||
],
|
||
"shared-worker-import-data-url.window.html": [
|
||
"Static import.",
|
||
"Static import (cross-origin).",
|
||
"Static import (redirect).",
|
||
"Nested static import.",
|
||
"Static import and then dynamic import.",
|
||
"Dynamic import.",
|
||
"Nested dynamic import.",
|
||
"Dynamic import and then static import.",
|
||
"eval(import())."
|
||
],
|
||
"shared-worker-import.window.html": [
|
||
"Static import.",
|
||
"Static import (cross-origin).",
|
||
"Static import (redirect).",
|
||
"Nested static import.",
|
||
"Static import and then dynamic import.",
|
||
"Dynamic import.",
|
||
"Nested dynamic import.",
|
||
"Dynamic import and then static import.",
|
||
"eval(import())."
|
||
]
|
||
},
|
||
"nested_worker.worker.html": true,
|
||
"nested_worker_close_self.worker.html": true,
|
||
"nested_worker_importScripts.worker.html": true,
|
||
"nested_worker_sync_xhr.worker.html": [
|
||
"Nested worker that issues a sync XHR"
|
||
],
|
||
"semantics": {
|
||
"encodings": {
|
||
"004.worker.html": true
|
||
},
|
||
"interface-objects": {
|
||
"001.worker.html": [
|
||
"The SharedWorker interface object should be exposed.",
|
||
"The ImageData interface object should be exposed.",
|
||
"The ImageBitmap interface object should be exposed.",
|
||
"The CanvasGradient interface object should be exposed.",
|
||
"The CanvasPattern interface object should be exposed.",
|
||
"The CanvasPath interface object should be exposed.",
|
||
"The TextMetrics interface object should be exposed.",
|
||
"The Path2D interface object should be exposed.",
|
||
"The PromiseRejectionEvent interface object should be exposed.",
|
||
"The EventSource interface object should be exposed.",
|
||
"The XMLHttpRequestEventTarget interface object should be exposed.",
|
||
"The XMLHttpRequestUpload interface object should be exposed.",
|
||
"The XMLHttpRequest interface object should be exposed.",
|
||
"The FileList interface object should be exposed.",
|
||
"The FileReaderSync interface object should be exposed.",
|
||
"The IDBRequest interface object should be exposed.",
|
||
"The IDBOpenDBRequest interface object should be exposed.",
|
||
"The IDBVersionChangeEvent interface object should be exposed.",
|
||
"The IDBFactory interface object should be exposed.",
|
||
"The IDBDatabase interface object should be exposed.",
|
||
"The IDBObjectStore interface object should be exposed.",
|
||
"The IDBIndex interface object should be exposed.",
|
||
"The IDBKeyRange interface object should be exposed.",
|
||
"The IDBCursor interface object should be exposed.",
|
||
"The IDBCursorWithValue interface object should be exposed.",
|
||
"The IDBTransaction interface object should be exposed."
|
||
],
|
||
"002.worker.html": true
|
||
},
|
||
"multiple-workers": {
|
||
"exposure.any.html": [
|
||
"SharedWorker exposure"
|
||
],
|
||
"exposure.any.worker.html": true
|
||
}
|
||
},
|
||
"shared-worker-from-blob-url.window.html": [
|
||
"Creating a shared worker from a blob URL works.",
|
||
"Creating a shared worker from a blob URL works immediately before revoking.",
|
||
"Connecting to a shared worker on a revoked blob URL works."
|
||
],
|
||
"shared-worker-in-data-url-context.window.html": [
|
||
"Create a shared worker in a data url frame",
|
||
"Create a data url shared worker in a data url frame"
|
||
],
|
||
"worker-performance.worker.html": [
|
||
"Resource timing seems to work in workers",
|
||
"performance.clearResourceTimings in workers",
|
||
"performance.setResourceTimingBufferSize in workers"
|
||
]
|
||
},
|
||
"urlpattern": {
|
||
"urlpattern-compare.any.html": [
|
||
"Component: pathname Left: {\"pathname\":\"/foo/a\"} Right: {\"pathname\":\"/foo/b\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/b\"} Right: {\"pathname\":\"/foo/bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/bar\"} Right: {\"pathname\":\"/foo/:bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/\"} Right: {\"pathname\":\"/foo/:bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/:bar\"} Right: {\"pathname\":\"/foo/*\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/(bar)\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/{bar}+\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}+\"} Right: {\"pathname\":\"/foo/{bar}?\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}?\"} Right: {\"pathname\":\"/foo/{bar}*\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/(123)\"} Right: {\"pathname\":\"/foo/(12)\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/:b\"} Right: {\"pathname\":\"/foo/:a\"}",
|
||
"Component: pathname Left: {\"pathname\":\"*/foo\"} Right: {\"pathname\":\"*\"}",
|
||
"Component: port Left: {\"port\":\"9\"} Right: {\"port\":\"100\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo/{:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"fo{o/:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar/}?baz\"}",
|
||
"Component: pathname Left: \"https://a.example.com/b?a\" Right: \"https://b.example.com/a?b\"",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}/baz\"} Right: {\"pathname\":\"/foo/bar/baz\"}",
|
||
"Component: protocol Left: {\"protocol\":\"a\"} Right: {\"protocol\":\"b\"}",
|
||
"Component: username Left: {\"username\":\"a\"} Right: {\"username\":\"b\"}",
|
||
"Component: password Left: {\"password\":\"a\"} Right: {\"password\":\"b\"}",
|
||
"Component: hostname Left: {\"hostname\":\"a\"} Right: {\"hostname\":\"b\"}",
|
||
"Component: search Left: {\"search\":\"a\"} Right: {\"search\":\"b\"}",
|
||
"Component: hash Left: {\"hash\":\"a\"} Right: {\"hash\":\"b\"}"
|
||
],
|
||
"urlpattern-compare.any.worker.html": [
|
||
"Component: pathname Left: {\"pathname\":\"/foo/a\"} Right: {\"pathname\":\"/foo/b\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/b\"} Right: {\"pathname\":\"/foo/bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/bar\"} Right: {\"pathname\":\"/foo/:bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/\"} Right: {\"pathname\":\"/foo/:bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/:bar\"} Right: {\"pathname\":\"/foo/*\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/(bar)\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/{bar}+\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}+\"} Right: {\"pathname\":\"/foo/{bar}?\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}?\"} Right: {\"pathname\":\"/foo/{bar}*\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/(123)\"} Right: {\"pathname\":\"/foo/(12)\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/:b\"} Right: {\"pathname\":\"/foo/:a\"}",
|
||
"Component: pathname Left: {\"pathname\":\"*/foo\"} Right: {\"pathname\":\"*\"}",
|
||
"Component: port Left: {\"port\":\"9\"} Right: {\"port\":\"100\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo/{:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"fo{o/:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar/}?baz\"}",
|
||
"Component: pathname Left: \"https://a.example.com/b?a\" Right: \"https://b.example.com/a?b\"",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}/baz\"} Right: {\"pathname\":\"/foo/bar/baz\"}",
|
||
"Component: protocol Left: {\"protocol\":\"a\"} Right: {\"protocol\":\"b\"}",
|
||
"Component: username Left: {\"username\":\"a\"} Right: {\"username\":\"b\"}",
|
||
"Component: password Left: {\"password\":\"a\"} Right: {\"password\":\"b\"}",
|
||
"Component: hostname Left: {\"hostname\":\"a\"} Right: {\"hostname\":\"b\"}",
|
||
"Component: search Left: {\"search\":\"a\"} Right: {\"search\":\"b\"}",
|
||
"Component: hash Left: {\"hash\":\"a\"} Right: {\"hash\":\"b\"}"
|
||
],
|
||
"urlpattern-compare.https.any.html": [
|
||
"Component: pathname Left: {\"pathname\":\"/foo/a\"} Right: {\"pathname\":\"/foo/b\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/b\"} Right: {\"pathname\":\"/foo/bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/bar\"} Right: {\"pathname\":\"/foo/:bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/\"} Right: {\"pathname\":\"/foo/:bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/:bar\"} Right: {\"pathname\":\"/foo/*\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/(bar)\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/{bar}+\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}+\"} Right: {\"pathname\":\"/foo/{bar}?\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}?\"} Right: {\"pathname\":\"/foo/{bar}*\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/(123)\"} Right: {\"pathname\":\"/foo/(12)\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/:b\"} Right: {\"pathname\":\"/foo/:a\"}",
|
||
"Component: pathname Left: {\"pathname\":\"*/foo\"} Right: {\"pathname\":\"*\"}",
|
||
"Component: port Left: {\"port\":\"9\"} Right: {\"port\":\"100\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo/{:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"fo{o/:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar/}?baz\"}",
|
||
"Component: pathname Left: \"https://a.example.com/b?a\" Right: \"https://b.example.com/a?b\"",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}/baz\"} Right: {\"pathname\":\"/foo/bar/baz\"}",
|
||
"Component: protocol Left: {\"protocol\":\"a\"} Right: {\"protocol\":\"b\"}",
|
||
"Component: username Left: {\"username\":\"a\"} Right: {\"username\":\"b\"}",
|
||
"Component: password Left: {\"password\":\"a\"} Right: {\"password\":\"b\"}",
|
||
"Component: hostname Left: {\"hostname\":\"a\"} Right: {\"hostname\":\"b\"}",
|
||
"Component: search Left: {\"search\":\"a\"} Right: {\"search\":\"b\"}",
|
||
"Component: hash Left: {\"hash\":\"a\"} Right: {\"hash\":\"b\"}"
|
||
],
|
||
"urlpattern-compare.https.any.worker.html": [
|
||
"Component: pathname Left: {\"pathname\":\"/foo/a\"} Right: {\"pathname\":\"/foo/b\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/b\"} Right: {\"pathname\":\"/foo/bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/bar\"} Right: {\"pathname\":\"/foo/:bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/\"} Right: {\"pathname\":\"/foo/:bar\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/:bar\"} Right: {\"pathname\":\"/foo/*\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/(bar)\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}\"} Right: {\"pathname\":\"/foo/{bar}+\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}+\"} Right: {\"pathname\":\"/foo/{bar}?\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}?\"} Right: {\"pathname\":\"/foo/{bar}*\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/(123)\"} Right: {\"pathname\":\"/foo/(12)\"}",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/:b\"} Right: {\"pathname\":\"/foo/:a\"}",
|
||
"Component: pathname Left: {\"pathname\":\"*/foo\"} Right: {\"pathname\":\"*\"}",
|
||
"Component: port Left: {\"port\":\"9\"} Right: {\"port\":\"100\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo/{:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"fo{o/:bar}?/baz\"}",
|
||
"Component: pathname Left: {\"pathname\":\"foo/:bar?/baz\"} Right: {\"pathname\":\"foo{/:bar/}?baz\"}",
|
||
"Component: pathname Left: \"https://a.example.com/b?a\" Right: \"https://b.example.com/a?b\"",
|
||
"Component: pathname Left: {\"pathname\":\"/foo/{bar}/baz\"} Right: {\"pathname\":\"/foo/bar/baz\"}",
|
||
"Component: protocol Left: {\"protocol\":\"a\"} Right: {\"protocol\":\"b\"}",
|
||
"Component: username Left: {\"username\":\"a\"} Right: {\"username\":\"b\"}",
|
||
"Component: password Left: {\"password\":\"a\"} Right: {\"password\":\"b\"}",
|
||
"Component: hostname Left: {\"hostname\":\"a\"} Right: {\"hostname\":\"b\"}",
|
||
"Component: search Left: {\"search\":\"a\"} Right: {\"search\":\"b\"}",
|
||
"Component: hash Left: {\"hash\":\"a\"} Right: {\"hash\":\"b\"}"
|
||
],
|
||
"urlpattern.any.html": [
|
||
"Pattern: [{\"pathname\":\"/foo/bar\"}] Inputs: [\"./foo/bar\",\"https://example.com\"]",
|
||
"Pattern: [{\"hostname\":\"bad\\\\:hostname\"}] Inputs: undefined",
|
||
"Pattern: [{\"hostname\":\"bad|hostname\"}] Inputs: undefined",
|
||
"Pattern: [] Inputs: [\"https://example.com/\"]",
|
||
"Pattern: [] Inputs: [{}]",
|
||
"Pattern: [] Inputs: []"
|
||
],
|
||
"urlpattern.any.worker.html": [
|
||
"Pattern: [{\"pathname\":\"/foo/bar\"}] Inputs: [\"./foo/bar\",\"https://example.com\"]",
|
||
"Pattern: [{\"hostname\":\"bad\\\\:hostname\"}] Inputs: undefined",
|
||
"Pattern: [{\"hostname\":\"bad|hostname\"}] Inputs: undefined",
|
||
"Pattern: [] Inputs: [\"https://example.com/\"]",
|
||
"Pattern: [] Inputs: [{}]",
|
||
"Pattern: [] Inputs: []"
|
||
],
|
||
"urlpattern.https.any.html": [
|
||
"Pattern: [{\"pathname\":\"/foo/bar\"}] Inputs: [\"./foo/bar\",\"https://example.com\"]",
|
||
"Pattern: [{\"hostname\":\"bad\\\\:hostname\"}] Inputs: undefined",
|
||
"Pattern: [{\"hostname\":\"bad|hostname\"}] Inputs: undefined",
|
||
"Pattern: [] Inputs: [\"https://example.com/\"]",
|
||
"Pattern: [] Inputs: [{}]",
|
||
"Pattern: [] Inputs: []"
|
||
],
|
||
"urlpattern.https.any.worker.html": [
|
||
"Pattern: [{\"pathname\":\"/foo/bar\"}] Inputs: [\"./foo/bar\",\"https://example.com\"]",
|
||
"Pattern: [{\"hostname\":\"bad\\\\:hostname\"}] Inputs: undefined",
|
||
"Pattern: [{\"hostname\":\"bad|hostname\"}] Inputs: undefined",
|
||
"Pattern: [] Inputs: [\"https://example.com/\"]",
|
||
"Pattern: [] Inputs: [{}]",
|
||
"Pattern: [] Inputs: []"
|
||
]
|
||
}
|
||
} |