Closed Bug 1725153 Opened 4 years ago Closed 4 years ago

Intermittent [ Tier 2 ]TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations - Test timed out

Categories

(Testing :: web-platform-tests, defect, P5)

defect

Tracking

(Not tracked)

RESOLVED INCOMPLETE

People

(Reporter: intermittent-bug-filer, Unassigned)

Details

(Keywords: intermittent-failure)

Filed by: ccozmuta [at] mozilla.com
Parsed log: https://treeherder.mozilla.org/logviewer?job_id=348074976&repo=mozilla-central
Full log: https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/CfQ_1u9JRESE-RxHvrdLCw/runs/0/artifacts/public/logs/live_backing.log


[task 2021-08-11T11:21:01.981Z] 11:21:01     INFO - TEST-START | /html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.get.semitransparent.worker.html
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 192  using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 192  using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 256  using empty password, short salt, SHA-384, with 100000 iterations 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 256  using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 256  using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 256  using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 128  using empty password, short salt, SHA-384, with 100000 iterations 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 128  using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 128  using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage 
[task 2021-08-11T11:21:01.996Z] 11:21:01     INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 128  using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key 
[task 2021-08-11T11:21:01.997Z] 11:21:01     INFO - TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192  using empty password, short salt, SHA-384, with 100000 iterations - Test timed out
[task 2021-08-11T11:21:02.013Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.013Z] 11:21:02     INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192  using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384 - expected PASS
[task 2021-08-11T11:21:02.015Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.015Z] 11:21:02     INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192  using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2021-08-11T11:21:02.017Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.017Z] 11:21:02     INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192  using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2021-08-11T11:21:02.018Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.019Z] 11:21:02     INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 256  using empty password, short salt, SHA-384, with 100000 iterations - expected PASS
[task 2021-08-11T11:21:02.019Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.020Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 256  using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384 
[task 2021-08-11T11:21:02.020Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.021Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 256  using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 256  using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 128  using empty password, short salt, SHA-384, with 100000 iterations 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 128  using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 128  using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 128  using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 192  using empty password, short salt, SHA-384, with 100000 iterations 
[task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - 
task 2021-08-11T11:21:02.026Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 192  using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384 
[task 2021-08-11T11:21:02.027Z] 11:21:02     INFO - 
[task 2021-08-11T11:21:02.027Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 192  using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage 
[task 2021-08-11T11:21:02.028Z] 11:21:02     INFO - TEST-KNOWN-INTERMITTENT-TIMEOUT | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | took 61621ms
[task 2021-08-11T11:21:02.030Z] 11:21:02     INFO - Closing window 20c5b70b-d0ff-4ef8-95cc-fcb777568357
[task 2021-08-11T11:21:02.031Z] 11:21:02     INFO - PID 1285 | 1628680861888	Marionette	INFO	Stopped listening on port 35091
[task 2021-08-11T11:21:02.092Z] 11:21:02     INFO - PID 1285 | JavaScript error: resource:///modules/Interactions.jsm, line 230: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver]
[task 2021-08-11T11:21:02.305Z] 11:21:02     INFO - .
[task 2021-08-11T11:21:02.305Z] 11:21:02     INFO - TEST-OK | /html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.get.semitransparent.worker.html | took 446ms

Status: NEW → RESOLVED
Closed: 4 years ago
Resolution: --- → INCOMPLETE
You need to log in before you can comment on or make changes to this bug.