Closed Bug 1452591 Opened 7 years ago Closed 7 years ago

Intermittent TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations - Test timed out

Categories

(Core :: DOM: Security, defect, P5)

defect

Tracking

()

RESOLVED DUPLICATE of bug 1405949

People

(Reporter: intermittent-bug-filer, Unassigned)

Details

(Keywords: intermittent-failure, Whiteboard: [domsecurity-intermittent])

Filed by: ccoroiu [at] mozilla.com https://treeherder.mozilla.org/logviewer.html#?job_id=172641139&repo=autoland https://queue.taskcluster.net/v1/task/ZJetJnp3RTuFqgZjjiEWJw/runs/0/artifacts/public/logs/live_backing.log [task 2018-04-09T10:43:51.833Z] 10:43:51 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html [task 2018-04-09T10:44:52.824Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.825Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage [task 2018-04-09T10:44:52.825Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key [task 2018-04-09T10:44:52.826Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations [task 2018-04-09T10:44:52.826Z] 10:44:52 INFO - TEST-FAIL | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512 - assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected "NotSupportedError" but got "SyntaxError" [task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - run_test/</</</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:82:37 [task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - promise callback*run_test/</</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:78:40 [task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - Test.prototype.step@https://web-platform.test:8443/resources/testharness.js:1494:20 [task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - promise_test/tests.promise_tests<@https://web-platform.test:8443/resources/testharness.js:543:27 [task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - promise callback*promise_test@https://web-platform.test:8443/resources/testharness.js:539:31 [task 2018-04-09T10:44:52.827Z] 10:44:52 INFO - run_test/</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:77:29 [task 2018-04-09T10:44:52.828Z] 10:44:52 INFO - run_test/</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:49:25 [task 2018-04-09T10:44:52.828Z] 10:44:52 INFO - run_test/</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:34:21 [task 2018-04-09T10:44:52.829Z] 10:44:52 INFO - run_test/</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:33:17 [task 2018-04-09T10:44:52.829Z] 10:44:52 INFO - run_test/</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:31:13 [task 2018-04-09T10:44:52.830Z] 10:44:52 INFO - run_test/<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:29:9 [task 2018-04-09T10:44:52.830Z] 10:44:52 INFO - promise callback*run_test@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:15:5 [task 2018-04-09T10:44:52.831Z] 10:44:52 INFO - @https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html:18:1 [task 2018-04-09T10:44:52.832Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage [task 2018-04-09T10:44:52.832Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key [task 2018-04-09T10:44:52.833Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations [task 2018-04-09T10:44:52.834Z] 10:44:52 INFO - TEST-FAIL | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512 - assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected "NotSupportedError" but got "SyntaxError" [task 2018-04-09T10:44:52.835Z] 10:44:52 INFO - run_test/</</</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:82:37 [task 2018-04-09T10:44:52.836Z] 10:44:52 INFO - promise callback*run_test/</</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:78:40 [task 2018-04-09T10:44:52.836Z] 10:44:52 INFO - Test.prototype.step@https://web-platform.test:8443/resources/testharness.js:1494:20 [task 2018-04-09T10:44:52.838Z] 10:44:52 INFO - promise_test/tests.promise_tests<@https://web-platform.test:8443/resources/testharness.js:543:27 [task 2018-04-09T10:44:52.839Z] 10:44:52 INFO - promise callback*promise_test@https://web-platform.test:8443/resources/testharness.js:539:31 [task 2018-04-09T10:44:52.839Z] 10:44:52 INFO - run_test/</</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:77:29 [task 2018-04-09T10:44:52.840Z] 10:44:52 INFO - run_test/</</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:49:25 [task 2018-04-09T10:44:52.841Z] 10:44:52 INFO - run_test/</</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:34:21 [task 2018-04-09T10:44:52.841Z] 10:44:52 INFO - run_test/</</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:33:17 [task 2018-04-09T10:44:52.843Z] 10:44:52 INFO - run_test/</<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:31:13 [task 2018-04-09T10:44:52.844Z] 10:44:52 INFO - run_test/<@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:29:9 [task 2018-04-09T10:44:52.845Z] 10:44:52 INFO - promise callback*run_test@https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/pbkdf2.js:15:5 [task 2018-04-09T10:44:52.845Z] 10:44:52 INFO - @https://web-platform.test:8443/WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html:18:1 [task 2018-04-09T10:44:52.846Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage [task 2018-04-09T10:44:52.847Z] 10:44:52 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key [task 2018-04-09T10:44:52.847Z] 10:44:52 INFO - TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations - Test timed out [task 2018-04-09T10:44:52.848Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.850Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512 - expected FAIL [task 2018-04-09T10:44:52.850Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.851Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.852Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.853Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.854Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.855Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.856Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with null length - expected FAIL [task 2018-04-09T10:44:52.857Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.858Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.859Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with 0 length - expected FAIL [task 2018-04-09T10:44:52.860Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.861Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.862Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with non-multiple of 8 length - expected FAIL [task 2018-04-09T10:44:52.862Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.863Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.864Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512 - expected FAIL [task 2018-04-09T10:44:52.865Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.866Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.867Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with missing deriveBits usage - expected PASS [task 2018-04-09T10:44:52.868Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.868Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.869Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.870Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.870Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.871Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.872Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.872Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.873Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.874Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.875Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.876Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.877Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.878Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.879Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.879Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.880Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.881Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.882Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.882Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.883Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.884Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.885Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.886Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.887Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.887Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.888Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.889Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.890Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.890Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.891Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.892Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.893Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.893Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.895Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.896Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 0 iterations - expected PASS [task 2018-04-09T10:44:52.897Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.898Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.899Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.900Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.901Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.902Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.903Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.903Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.905Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.906Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.907Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.908Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.909Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.910Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.911Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.912Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.913Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.914Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.915Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.916Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.917Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.917Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.918Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.919Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.919Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.920Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.920Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.921Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.922Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.923Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.923Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.924Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.925Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.925Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.926Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.926Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.927Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.928Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.929Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.929Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.930Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.931Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.931Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.932Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.933Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.933Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.934Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.935Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.935Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.936Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.937Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.937Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.938Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.939Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.940Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.940Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.941Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.942Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.942Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.943Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.943Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.944Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.945Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.946Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.946Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.947Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.948Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.948Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.949Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.950Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.950Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.951Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.952Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.953Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.954Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.954Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.956Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.957Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.958Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.959Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.959Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.960Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.961Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.964Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.964Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.965Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.966Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.966Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.967Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.968Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.968Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.969Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.970Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.970Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.971Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.972Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.972Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.973Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.974Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.977Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.977Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.978Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.979Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.979Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.980Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.981Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.981Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.982Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.983Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.984Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.986Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.989Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.990Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.990Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.991Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.992Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.992Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.993Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.994Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:52.994Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.995Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:52.996Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.996Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:52.997Z] 10:44:52 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:52.997Z] 10:44:52 INFO - [task 2018-04-09T10:44:52.998Z] 10:44:52 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:52.999Z] 10:44:52 INFO - [task 2018-04-09T10:44:53.001Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:53.002Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.003Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:53.003Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.003Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:53.006Z] 10:44:53 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:53.006Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.007Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:53.008Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.009Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:53.009Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.010Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations - expected PASS [task 2018-04-09T10:44:53.010Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.012Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:53.012Z] 10:44:53 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:53.013Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.014Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage - expected PASS [task 2018-04-09T10:44:53.014Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.015Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:53.019Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.020Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with null length - expected FAIL [task 2018-04-09T10:44:53.020Z] 10:44:53 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:53.021Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.022Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with 0 length - expected FAIL [task 2018-04-09T10:44:53.022Z] 10:44:53 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:53.023Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.024Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with non-multiple of 8 length - expected FAIL [task 2018-04-09T10:44:53.024Z] 10:44:53 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:53.024Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.025Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:53.025Z] 10:44:53 INFO - TEST-INFO | expected FAIL [task 2018-04-09T10:44:53.025Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.026Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with missing deriveBits usage - expected PASS [task 2018-04-09T10:44:53.027Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.028Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key - expected PASS [task 2018-04-09T10:44:53.028Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.029Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | long password, empty salt, SHA-1, with 1000 iterations - expected PASS [task 2018-04-09T10:44:53.029Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.031Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations - expected PASS [task 2018-04-09T10:44:53.032Z] 10:44:53 INFO - [task 2018-04-09T10:44:53.032Z] 10:44:53 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/test_pbkdf2_long_empty.https.html | Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1 - expected FAIL [task 2018-04-09T10:44:53.033Z] 10:44:53 INFO - TEST-INFO | expected FAIL
Whiteboard: [domsecurity-intermittent]
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.