Closed
Bug 1452591
Opened 7 years ago
Closed 7 years ago
Intermittent TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations - Test timed out
Categories
(Core :: DOM: Security, defect, P5)
Core
DOM: Security
Tracking
()
RESOLVED
DUPLICATE
of bug 1405949
People
(Reporter: intermittent-bug-filer, Unassigned)
Details
(Keywords: intermittent-failure, Whiteboard: [domsecurity-intermittent])
Filed by: ccoroiu [at] mozilla.com
https://treeherder.mozilla.org/logviewer.html#?job_id=172641139&repo=autoland
https://queue.taskcluster.net/v1/task/ZJetJnp3RTuFqgZjjiEWJw/runs/0/artifacts/public/logs/live_backing.log
[task 2018-04-09T10:43:51.833Z] 10:43:51 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html
[task 2018-04-09T10:44:52.824Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.825Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage
[task 2018-04-09T10:44:52.825Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key
[task 2018-04-09T10:44:52.826Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations
[task 2018-04-09T10:44:52.826Z] 10:44:52 INFO - TEST-FAIL | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512 - assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected "NotSupportedError" but got "SyntaxError"
[task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - run_test/</</</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:82:37
[task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - promise callback*run_test/</</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:78:40
[task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - Test.prototype.step@https://web-platform.test:8443/resources/testharness.js:1494:20
[task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - promise_test/tests.promise_tests<@https://web-platform.test:8443/resources/testharness.js:543:27
[task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - promise callback*promise_test@https://web-platform.test:8443/resources/testharness.js:539:31
[task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - run_test/</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:77:29
[task 2018-04-09T10:44:52.828Z] 10:44:52 INFO - run_test/</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:49:25
[task 2018-04-09T10:44:52.828Z] 10:44:52 INFO - run_test/</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:34:21
[task 2018-04-09T10:44:52.829Z] 10:44:52 INFO - run_test/</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:33:17
[task 2018-04-09T10:44:52.829Z] 10:44:52 INFO - run_test/</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:31:13
[task 2018-04-09T10:44:52.830Z] 10:44:52 INFO - run_test/<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:29:9
[task 2018-04-09T10:44:52.830Z] 10:44:52 INFO - promise callback*run_test@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:15:5
[task 2018-04-09T10:44:52.831Z] 10:44:52 INFO - @https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html:18:1
[task 2018-04-09T10:44:52.832Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage
[task 2018-04-09T10:44:52.832Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key
[task 2018-04-09T10:44:52.833Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations
[task 2018-04-09T10:44:52.834Z] 10:44:52 INFO - TEST-FAIL | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512 - assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected "NotSupportedError" but got "SyntaxError"
[task 2018-04-09T10:44:52.835Z] 10:44:52 INFO - run_test/</</</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:82:37
[task 2018-04-09T10:44:52.836Z] 10:44:52 INFO - promise callback*run_test/</</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:78:40
[task 2018-04-09T10:44:52.836Z] 10:44:52 INFO - Test.prototype.step@https://web-platform.test:8443/resources/testharness.js:1494:20
[task 2018-04-09T10:44:52.838Z] 10:44:52 INFO - promise_test/tests.promise_tests<@https://web-platform.test:8443/resources/testharness.js:543:27
[task 2018-04-09T10:44:52.839Z] 10:44:52 INFO - promise callback*promise_test@https://web-platform.test:8443/resources/testharness.js:539:31
[task 2018-04-09T10:44:52.839Z] 10:44:52 INFO - run_test/</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:77:29
[task 2018-04-09T10:44:52.840Z] 10:44:52 INFO - run_test/</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:49:25
[task 2018-04-09T10:44:52.841Z] 10:44:52 INFO - run_test/</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:34:21
[task 2018-04-09T10:44:52.841Z] 10:44:52 INFO - run_test/</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:33:17
[task 2018-04-09T10:44:52.843Z] 10:44:52 INFO - run_test/</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:31:13
[task 2018-04-09T10:44:52.844Z] 10:44:52 INFO - run_test/<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:29:9
[task 2018-04-09T10:44:52.845Z] 10:44:52 INFO - promise callback*run_test@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:15:5
[task 2018-04-09T10:44:52.845Z] 10:44:52 INFO - @https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html:18:1
[task 2018-04-09T10:44:52.846Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage
[task 2018-04-09T10:44:52.847Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key
[task 2018-04-09T10:44:52.847Z] 10:44:52 INFO - TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations - Test timed out
[task 2018-04-09T10:44:52.848Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.850Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512 - expected FAIL
[task 2018-04-09T10:44:52.850Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.851Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.852Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.853Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.854Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.855Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.856Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with null length - expected FAIL
[task 2018-04-09T10:44:52.857Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.858Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.859Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with 0 length - expected FAIL
[task 2018-04-09T10:44:52.860Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.861Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.862Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with non-multiple of 8 length - expected FAIL
[task 2018-04-09T10:44:52.862Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.863Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.864Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512 - expected FAIL
[task 2018-04-09T10:44:52.865Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.866Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.867Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with missing deriveBits usage - expected PASS
[task 2018-04-09T10:44:52.868Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.868Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.869Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.870Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.870Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.871Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.872Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.872Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.873Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.874Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.875Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.876Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.877Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.878Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.879Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.879Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.880Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.881Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.882Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.882Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.883Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.884Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.885Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.886Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.887Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.887Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.888Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.889Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.890Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.890Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.891Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.892Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.893Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.893Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.895Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.896Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS
[task 2018-04-09T10:44:52.897Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.898Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.899Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.900Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.901Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.902Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.903Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.903Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.905Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.906Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.907Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.908Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.909Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.910Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.911Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.912Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.913Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.914Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.915Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.916Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.917Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.917Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.918Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.919Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.919Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.920Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.920Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.921Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.922Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.923Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.923Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.924Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.925Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.925Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.926Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.926Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.927Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.928Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.929Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.929Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.930Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.931Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.931Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.932Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.933Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.933Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.934Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.935Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.935Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.936Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.937Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.937Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.938Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.939Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.940Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.940Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.941Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.942Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.942Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.943Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.943Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.944Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.945Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.946Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.946Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.947Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.948Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.948Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.949Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.950Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.950Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.951Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.952Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.953Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.954Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.954Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.956Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.957Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.958Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.959Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.959Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.960Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.961Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.964Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.964Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.965Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.966Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.966Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.967Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.968Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.968Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.969Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.970Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.970Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.971Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.972Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.972Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.973Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.974Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.977Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.977Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.978Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.979Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.979Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.980Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.981Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.981Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.982Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.983Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.984Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.986Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.989Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.990Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.990Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.991Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.992Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.992Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.993Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.994Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:52.994Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.995Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:52.996Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.996Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:52.997Z] 10:44:52 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:52.997Z] 10:44:52 INFO -
[task 2018-04-09T10:44:52.998Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:52.999Z] 10:44:52 INFO -
[task 2018-04-09T10:44:53.001Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:53.002Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.003Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:53.003Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.003Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:53.006Z] 10:44:53 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:53.006Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.007Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:53.008Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.009Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:53.009Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.010Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS
[task 2018-04-09T10:44:53.010Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.012Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:53.012Z] 10:44:53 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:53.013Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.014Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS
[task 2018-04-09T10:44:53.014Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.015Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:53.019Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.020Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with null length - expected FAIL
[task 2018-04-09T10:44:53.020Z] 10:44:53 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:53.021Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.022Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with 0 length - expected FAIL
[task 2018-04-09T10:44:53.022Z] 10:44:53 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:53.023Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.024Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with non-multiple of 8 length - expected FAIL
[task 2018-04-09T10:44:53.024Z] 10:44:53 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:53.024Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.025Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:53.025Z] 10:44:53 INFO - TEST-INFO | expected FAIL
[task 2018-04-09T10:44:53.025Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.026Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with missing deriveBits usage - expected PASS
[task 2018-04-09T10:44:53.027Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.028Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS
[task 2018-04-09T10:44:53.028Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.029Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1000 iterations - expected PASS
[task 2018-04-09T10:44:53.029Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.031Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations - expected PASS
[task 2018-04-09T10:44:53.032Z] 10:44:53 INFO -
[task 2018-04-09T10:44:53.032Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1 - expected FAIL
[task 2018-04-09T10:44:53.033Z] 10:44:53 INFO - TEST-INFO | expected FAIL
Updated•7 years ago
|
Whiteboard: [domsecurity-intermittent]
Updated•7 years ago
|
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → DUPLICATE
Comment hidden (Intermittent Failures Robot) |
You need to log in
before you can comment on or make changes to this bug.
Description
•