Closed Bug 1451188 Opened 7 years ago Closed 7 years ago

Intermittent TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations - Test timed out

Categories

(Core :: DOM: Security, defect, P5)

defect

Tracking

()

RESOLVED INCOMPLETE

People

(Reporter: intermittent-bug-filer, Unassigned)

Details

(Keywords: intermittent-failure, Whiteboard: [domsecurity-intermittent])

Filed by: apavel [at] mozilla.com https://treeherder.mozilla.org/logviewer.html#?job_id=171756063&repo=autoland https://queue.taskcluster.net/v1/task/S3sn2n5yQQqFQVPnJXyrfg/runs/0/artifacts/public/logs/live_backing.log [task 2018-04-04T00:19:58.723Z] 00:19:58 INFO - @https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html:18:1 [task 2018-04-04T00:19:58.723Z] 00:19:58 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage [task 2018-04-04T00:19:58.724Z] 00:19:58 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key [task 2018-04-04T00:19:58.725Z] 00:19:58 INFO - TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations - Test timed out [task 2018-04-04T00:19:58.725Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.726Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL [task 2018-04-04T00:19:58.727Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.727Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.728Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS [task 2018-04-04T00:19:58.729Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.730Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-04T00:19:58.730Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.731Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations - expected PASS [task 2018-04-04T00:19:58.732Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.733Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL [task 2018-04-04T00:19:58.733Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.734Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.735Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS [task 2018-04-04T00:19:58.736Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.736Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-04T00:19:58.737Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.738Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS [task 2018-04-04T00:19:58.739Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.739Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL [task 2018-04-04T00:19:58.740Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.741Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.742Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS [task 2018-04-04T00:19:58.743Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.744Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-04T00:19:58.745Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.746Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS [task 2018-04-04T00:19:58.747Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.748Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL [task 2018-04-04T00:19:58.749Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.750Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.750Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS [task 2018-04-04T00:19:58.751Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.752Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-04T00:19:58.753Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.753Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS [task 2018-04-04T00:19:58.754Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.755Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL [task 2018-04-04T00:19:58.755Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.756Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.756Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS [task 2018-04-04T00:19:58.757Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.758Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-04T00:19:58.759Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.759Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS [task 2018-04-04T00:19:58.760Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.761Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL [task 2018-04-04T00:19:58.761Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.762Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.762Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS [task 2018-04-04T00:19:58.763Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.764Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-04T00:19:58.765Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.765Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS [task 2018-04-04T00:19:58.766Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.767Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL [task 2018-04-04T00:19:58.767Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.768Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.768Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS [task 2018-04-04T00:19:58.769Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.770Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-04T00:19:58.771Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.771Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with null length - expected FAIL [task 2018-04-04T00:19:58.772Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.772Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.773Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with 0 length - expected FAIL [task 2018-04-04T00:19:58.773Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.774Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.775Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with non-multiple of 8 length - expected FAIL [task 2018-04-04T00:19:58.775Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.778Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.779Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL [task 2018-04-04T00:19:58.779Z] 00:19:58 INFO - TEST-INFO | expected FAIL [task 2018-04-04T00:19:58.779Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.780Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with missing deriveBits usage - expected PASS [task 2018-04-04T00:19:58.785Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.786Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-04T00:19:58.787Z] 00:19:58 INFO - [task 2018-04-04T00:19:58.788Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 0 iterations - expected PASS [task 2018-04-04T00:19:58.789Z] 0
Component: web-platform-tests → DOM: Security
Product: Testing → Core
Version: Version 3 → Trunk
Whiteboard: [domsecurity-intermittent]
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → INCOMPLETE
You need to log in before you can comment on or make changes to this bug.