Closed
Bug 1725153
Opened 4 years ago
Closed 4 years ago
Intermittent [ Tier 2 ]TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations - Test timed out
Categories
(Testing :: web-platform-tests, defect, P5)
Testing
web-platform-tests
Tracking
(Not tracked)
RESOLVED
INCOMPLETE
People
(Reporter: intermittent-bug-filer, Unassigned)
Details
(Keywords: intermittent-failure)
Filed by: ccozmuta [at] mozilla.com
Parsed log: https://treeherder.mozilla.org/logviewer?job_id=348074976&repo=mozilla-central
Full log: https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/CfQ_1u9JRESE-RxHvrdLCw/runs/0/artifacts/public/logs/live_backing.log
[task 2021-08-11T11:21:01.981Z] 11:21:01 INFO - TEST-START | /html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.get.semitransparent.worker.html
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO -
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage
[task 2021-08-11T11:21:01.996Z] 11:21:01 INFO - TEST-PASS | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key
[task 2021-08-11T11:21:01.997Z] 11:21:01 INFO - TEST-UNEXPECTED-TIMEOUT | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations - Test timed out
[task 2021-08-11T11:21:02.013Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.013Z] 11:21:02 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384 - expected PASS
[task 2021-08-11T11:21:02.015Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.015Z] 11:21:02 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage - expected PASS
[task 2021-08-11T11:21:02.017Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.017Z] 11:21:02 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key - expected PASS
[task 2021-08-11T11:21:02.018Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.019Z] 11:21:02 INFO - TEST-UNEXPECTED-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations - expected PASS
[task 2021-08-11T11:21:02.019Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.020Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384
[task 2021-08-11T11:21:02.020Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.021Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations
[task 2021-08-11T11:21:02.026Z] 11:21:02 INFO -
task 2021-08-11T11:21:02.026Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384
[task 2021-08-11T11:21:02.027Z] 11:21:02 INFO -
[task 2021-08-11T11:21:02.027Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-NOTRUN | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage
[task 2021-08-11T11:21:02.028Z] 11:21:02 INFO - TEST-KNOWN-INTERMITTENT-TIMEOUT | /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?5001-6000 | took 61621ms
[task 2021-08-11T11:21:02.030Z] 11:21:02 INFO - Closing window 20c5b70b-d0ff-4ef8-95cc-fcb777568357
[task 2021-08-11T11:21:02.031Z] 11:21:02 INFO - PID 1285 | 1628680861888 Marionette INFO Stopped listening on port 35091
[task 2021-08-11T11:21:02.092Z] 11:21:02 INFO - PID 1285 | JavaScript error: resource:///modules/Interactions.jsm, line 230: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIUserIdleService.removeIdleObserver]
[task 2021-08-11T11:21:02.305Z] 11:21:02 INFO - .
[task 2021-08-11T11:21:02.305Z] 11:21:02 INFO - TEST-OK | /html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.get.semitransparent.worker.html | took 446ms
| Comment hidden (Intermittent Failures Robot) |
| Comment hidden (Intermittent Failures Robot) |
| Comment hidden (Intermittent Failures Robot) |
| Comment hidden (Intermittent Failures Robot) |
Comment 5•4 years ago
|
||
https://wiki.mozilla.org/Bug_Triage#Intermittent_Test_Failure_Cleanup
For more information, please visit auto_nag documentation.
Status: NEW → RESOLVED
Closed: 4 years ago
Resolution: --- → INCOMPLETE
You need to log in
before you can comment on or make changes to this bug.
Description
•