Closed
Bug 1451188
Opened 7 years ago
Closed 7 years ago
Intermittent TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations - Test timed out
Categories
(Core :: DOM: Security, defect, P5)
Core
DOM: Security
Tracking
()
RESOLVED
INCOMPLETE
People
(Reporter: intermittent-bug-filer, Unassigned)
Details
(Keywords: intermittent-failure, Whiteboard: [domsecurity-intermittent])
Filed by: apavel [at] mozilla.com
https://treeherder.mozilla.org/logviewer.html#?job_id=171756063&repo=autoland
https://queue.taskcluster.net/v1/task/S3sn2n5yQQqFQVPnJXyrfg/runs/0/artifacts/public/logs/live_backing.log
[task 2018-04-04T00:19:58.723Z] 00:19:58 INFO - @https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html:18:1
[task 2018-04-04T00:19:58.723Z] 00:19:58 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage
[task 2018-04-04T00:19:58.724Z] 00:19:58 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key
[task 2018-04-04T00:19:58.725Z] 00:19:58 INFO - TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations - Test timed out
[task 2018-04-04T00:19:58.725Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.726Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL
[task 2018-04-04T00:19:58.727Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.727Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.728Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2018-04-04T00:19:58.729Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.730Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-04T00:19:58.730Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.731Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations - expected PASS
[task 2018-04-04T00:19:58.732Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.733Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL
[task 2018-04-04T00:19:58.733Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.734Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.735Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2018-04-04T00:19:58.736Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.736Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-04T00:19:58.737Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.738Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS
[task 2018-04-04T00:19:58.739Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.739Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL
[task 2018-04-04T00:19:58.740Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.741Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.742Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2018-04-04T00:19:58.743Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.744Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-04T00:19:58.745Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.746Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS
[task 2018-04-04T00:19:58.747Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.748Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL
[task 2018-04-04T00:19:58.749Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.750Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.750Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2018-04-04T00:19:58.751Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.752Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-04T00:19:58.753Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.753Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS
[task 2018-04-04T00:19:58.754Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.755Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL
[task 2018-04-04T00:19:58.755Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.756Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.756Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2018-04-04T00:19:58.757Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.758Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-04T00:19:58.759Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.759Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS
[task 2018-04-04T00:19:58.760Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.761Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL
[task 2018-04-04T00:19:58.761Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.762Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.762Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2018-04-04T00:19:58.763Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.764Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-04T00:19:58.765Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.765Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations - expected PASS
[task 2018-04-04T00:19:58.766Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.767Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL
[task 2018-04-04T00:19:58.767Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.768Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.768Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2018-04-04T00:19:58.769Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.770Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-04T00:19:58.771Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.771Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with null length - expected FAIL
[task 2018-04-04T00:19:58.772Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.772Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.773Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with 0 length - expected FAIL
[task 2018-04-04T00:19:58.773Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.774Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.775Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with non-multiple of 8 length - expected FAIL
[task 2018-04-04T00:19:58.775Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.778Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.779Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256 - expected FAIL
[task 2018-04-04T00:19:58.779Z] 00:19:58 INFO - TEST-INFO | expected FAIL
[task 2018-04-04T00:19:58.779Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.780Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with missing deriveBits usage - expected PASS
[task 2018-04-04T00:19:58.785Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.786Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-04T00:19:58.787Z] 00:19:58 INFO -
[task 2018-04-04T00:19:58.788Z] 00:19:58 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_long.https.html | long password, long salt, SHA-256, with 0 iterations - expected PASS
[task 2018-04-04T00:19:58.789Z] 0
Updated•7 years ago
|
Component: web-platform-tests → DOM: Security
Product: Testing → Core
Version: Version 3 → Trunk
| Comment hidden (Intermittent Failures Robot) |
Updated•7 years ago
|
Whiteboard: [domsecurity-intermittent]
Comment 2•7 years ago
|
||
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → INCOMPLETE
You need to log in
before you can comment on or make changes to this bug.
Description
•