builder: fx-team_xp_ix-debug_test-web-platform-tests-9
slave: t-xp32-ix-111
starttime: 1477588779.0
results: success (0)
buildid: 20161027074934
builduid: b93a8759bd71498ea38b47e138e60cb2
revision: 9888f1a23001fde6435e1a9ed7e6d3af8dd988d8
========= Started set props: master (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:38.995843) =========
master: http://buildbot-master110.bb.releng.scl3.mozilla.com:8201/
========= Finished set props: master (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:38.996306) =========
========= Started downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:38.996582) =========
========= Finished downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:39.052930) =========
========= Started 'bash -c ...' (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:39.053340) =========
'bash' '-c' 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py']
environment:
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-111\Application Data
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-XP32-IX-111
COMSPEC=C:\WINDOWS\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-111
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOGONSERVER=\\T-XP32-IX-111
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SESSIONNAME=Console
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\WINDOWS
TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
TEST1=testie
TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
USERDOMAIN=T-XP32-IX-111
USERNAME=cltbld
USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-111
WINDIR=C:\WINDOWS
using PTY: False
--09:20:08-- https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py
=> `archiver_client.py'
Resolving hg.mozilla.org... 63.245.215.102, 63.245.215.25
Connecting to hg.mozilla.org|63.245.215.102|:443... connected.
WARNING: Certificate verification error for hg.mozilla.org: certificate signature failure
HTTP request sent, awaiting response... 200 Script output follows
Length: 12,179 (12K) [text/x-python]
0K .......... . 100% 12.54 MB/s
09:20:09 (12.54 MB/s) - `archiver_client.py' saved [12179/12179]
program finished with exit code 0
elapsedTime=0.493000
========= master_lag: 0.07 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:39.613790) =========
========= Started 'rm -rf ...' (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:39.614205) =========
'rm' '-rf' 'scripts' 'properties'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['rm', '-rf', 'scripts', 'properties']
environment:
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-111\Application Data
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-XP32-IX-111
COMSPEC=C:\WINDOWS\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-111
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOGONSERVER=\\T-XP32-IX-111
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SESSIONNAME=Console
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\WINDOWS
TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
TEST1=testie
TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
USERDOMAIN=T-XP32-IX-111
USERNAME=cltbld
USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-111
WINDIR=C:\WINDOWS
using PTY: False
program finished with exit code 0
elapsedTime=0.789000
========= master_lag: 0.10 =========
========= Finished 'rm -rf ...' (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:40.503627) =========
========= Started 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2016-10-27 10:19:40.503998) =========
'bash' '-c' u'python archiver_client.py mozharness --repo integration/fx-team --rev 9888f1a23001fde6435e1a9ed7e6d3af8dd988d8 --destination scripts --debug'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', u'python archiver_client.py mozharness --repo integration/fx-team --rev 9888f1a23001fde6435e1a9ed7e6d3af8dd988d8 --destination scripts --debug']
environment:
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-111\Application Data
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-XP32-IX-111
COMSPEC=C:\WINDOWS\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-111
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOGONSERVER=\\T-XP32-IX-111
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SESSIONNAME=Console
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\WINDOWS
TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
TEST1=testie
TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
USERDOMAIN=T-XP32-IX-111
USERNAME=cltbld
USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-111
WINDIR=C:\WINDOWS
using PTY: False
2016-10-27 09:20:10,193 truncating revision to first 12 chars
2016-10-27 09:20:10,193 Setting DEBUG logging.
2016-10-27 09:20:10,193 attempt 1/10
2016-10-27 09:20:10,193 Getting archive location from https://api.pub.build.mozilla.org/archiver/hgmo/integration/fx-team/9888f1a23001?&preferred_region=us-west-2&suffix=tar.gz&subdir=testing/mozharness
2016-10-27 09:20:10,644 unpacking tar archive at: fx-team-9888f1a23001/testing/mozharness/
2016-10-27 09:20:10,742 skipping symlink on windows: configs/single_locale/linux32.py
program finished with exit code 0
elapsedTime=1.098000
========= master_lag: 0.14 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2016-10-27 10:19:41.739503) =========
========= Started set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:41.739832) =========
script_repo_revision: 9888f1a23001fde6435e1a9ed7e6d3af8dd988d8
========= Finished set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:41.740232) =========
========= Started downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:41.740499) =========
========= Finished downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2016-10-27 10:19:41.755698) =========
========= Started 'c:/mozilla-build/python27/python -u ...' (results: 0, elapsed: 1 hrs, 57 secs) (at 2016-10-27 10:19:41.755966) =========
'c:/mozilla-build/python27/python' '-u' 'scripts/scripts/web_platform_tests.py' '--cfg' 'web_platform_tests/prod_config_windows.py' '--test-type=testharness' '--total-chunks' '10' '--this-chunk' '9' '--blob-upload-branch' 'fx-team' '--download-symbols' 'true'
in dir C:\slave\test\. (timeout 1800 secs) (maxTime 7200 secs)
watching logfiles {}
argv: ['c:/mozilla-build/python27/python', '-u', 'scripts/scripts/web_platform_tests.py', '--cfg', 'web_platform_tests/prod_config_windows.py', '--test-type=testharness', '--total-chunks', '10', '--this-chunk', '9', '--blob-upload-branch', 'fx-team', '--download-symbols', 'true']
environment:
ALLUSERSPROFILE=C:\Documents and Settings\All Users
APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-111\Application Data
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-XP32-IX-111
COMSPEC=C:\WINDOWS\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
DevEnvDir=D:\msvs8\Common7\IDE
FP_NO_HOST_CHECK=NO
FrameworkDir=C:\WINDOWS\Microsoft.NET\Framework
FrameworkSDKDir=D:\msvs8\SDK\v2.0
FrameworkVersion=v2.0.50727
HOMEDRIVE=C:
HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-111
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LIBPATH=C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727;D:\msvs8\VC\ATLMFC\LIB
LOGONSERVER=\\T-XP32-IX-111
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
MOZILLABUILD=D:\mozilla-build
MOZILLABUILDDRIVE=C:
MOZILLABUILDPATH=\mozilla-build\
MOZ_AIRBAG=1
MOZ_CRASHREPORTER_NO_REPORT=1
MOZ_HIDE_RESULTS_TABLE=1
MOZ_MSVCVERSION=8
MOZ_NO_REMOTE=1
MOZ_TOOLS=D:\mozilla-build\moztools
MSVCDir=D:\msvs8\VC
NO_EM_RESTART=1
NO_FAIL_ON_TEST_ERRORS=1
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PROPERTIES_FILE=C:\slave\test/buildprops.json
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SESSIONNAME=Console
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\WINDOWS
TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
TEST1=testie
TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp
USERDOMAIN=T-XP32-IX-111
USERNAME=cltbld
USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-111
VCINSTALLDIR=D:\msvs8\VC
VCVARS=D:\msvs8\VC\bin\vcvars32.bat
VSINSTALLDIR=D:\msvs8
WINDIR=C:\WINDOWS
XPCOM_DEBUG_BREAK=warn
using PTY: False
09:20:11 INFO - MultiFileLogger online at 20161027 09:20:11 in C:\slave\test
09:20:11 INFO - Run as scripts/scripts/web_platform_tests.py --cfg web_platform_tests/prod_config_windows.py --test-type=testharness --total-chunks 10 --this-chunk 9 --blob-upload-branch fx-team --download-symbols true
09:20:11 INFO - Dumping config to C:\slave\test\logs\localconfig.json.
09:20:11 INFO - {'allow_software_gl_layers': False,
09:20:11 INFO - 'append_to_log': False,
09:20:11 INFO - 'base_work_dir': 'C:\\slave\\test',
09:20:11 INFO - 'blob_upload_branch': 'fx-team',
09:20:11 INFO - 'blob_uploader_auth_file': 'C:\\slave\\test\\oauth.txt',
09:20:11 INFO - 'buildbot_json_path': 'buildprops.json',
09:20:11 INFO - 'config_files': ('web_platform_tests/prod_config_windows.py',),
09:20:11 INFO - 'default_blob_upload_servers': ('https://blobupload.elasticbeanstalk.com',),
09:20:11 INFO - 'download_minidump_stackwalk': True,
09:20:11 INFO - 'download_symbols': 'true',
09:20:11 INFO - 'e10s': False,
09:20:11 INFO - 'exes': {'hg': 'c:/mozilla-build/hg/hg',
09:20:11 INFO - 'mozinstall': ('C:\\slave\\test/build/venv/scripts/python',
09:20:11 INFO - 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py'),
09:20:11 INFO - 'python': 'c:\\mozilla-build\\python27\\python.exe',
09:20:11 INFO - 'tooltool.py': ('c:\\mozilla-build\\python27\\python.exe',
09:20:11 INFO - 'C:/mozilla-build/tooltool.py'),
09:20:11 INFO - 'virtualenv': ('c:\\mozilla-build\\python27\\python.exe',
09:20:11 INFO - 'c:/mozilla-build/buildbotve/virtualenv.py')},
09:20:11 INFO - 'find_links': ('http://pypi.pvt.build.mozilla.org/pub',
09:20:11 INFO - 'http://pypi.pub.build.mozilla.org/pub'),
09:20:11 INFO - 'log_level': 'info',
09:20:11 INFO - 'log_to_console': True,
09:20:11 INFO - 'opt_config_files': (),
09:20:11 INFO - 'options': ('--prefs-root=%(test_path)s/prefs',
09:20:11 INFO - '--processes=1',
09:20:11 INFO - '--config=%(test_path)s/wptrunner.ini',
09:20:11 INFO - '--ca-cert-path=%(test_path)s/certs/cacert.pem',
09:20:11 INFO - '--host-key-path=%(test_path)s/certs/web-platform.test.key',
09:20:11 INFO - '--host-cert-path=%(test_path)s/certs/web-platform.test.pem',
09:20:11 INFO - '--certutil-binary=%(test_install_path)s/bin/certutil'),
09:20:11 INFO - 'pip_index': False,
09:20:11 INFO - 'require_test_zip': True,
09:20:11 INFO - 'test_type': ('testharness',),
09:20:11 INFO - 'this_chunk': '9',
09:20:11 INFO - 'total_chunks': '10',
09:20:11 INFO - 'virtualenv_path': 'venv',
09:20:11 INFO - 'volatile_config': {'actions': None, 'add_actions': None, 'no_actions': None},
09:20:11 INFO - 'work_dir': 'build'}
09:20:11 INFO - [mozharness: 2016-10-27 17:20:11.517000Z] Running clobber step.
09:20:11 INFO - Running pre-action listener: _resource_record_pre_action
09:20:11 INFO - Running main action method: clobber
09:20:11 INFO - rmtree: C:\slave\test\build
09:20:11 INFO - Using _rmtree_windows ...
09:20:11 INFO - retry: Calling _rmtree_windows with args: ('C:\\slave\\test\\build',), kwargs: {}, attempt #1
09:20:34 INFO - Running post-action listener: _resource_record_post_action
09:20:34 INFO - [mozharness: 2016-10-27 17:20:34.651000Z] Finished clobber step (success)
09:20:34 INFO - [mozharness: 2016-10-27 17:20:34.651000Z] Running read-buildbot-config step.
09:20:34 INFO - Running pre-action listener: _resource_record_pre_action
09:20:34 INFO - Running main action method: read_buildbot_config
09:20:34 INFO - Using buildbot properties:
09:20:34 INFO - {
09:20:34 INFO - "project": "",
09:20:34 INFO - "product": "firefox",
09:20:34 INFO - "script_repo_revision": "production",
09:20:34 INFO - "scheduler": "tests-fx-team-xp_ix-debug-unittest",
09:20:34 INFO - "repository": "",
09:20:34 INFO - "buildername": "Windows XP 32-bit fx-team debug test web-platform-tests-9",
09:20:34 INFO - "buildid": "20161027074934",
09:20:34 INFO - "pgo_build": "False",
09:20:34 INFO - "basedir": "C:\\slave\\test",
09:20:34 INFO - "buildnumber": 52,
09:20:34 INFO - "slavename": "t-xp32-ix-111",
09:20:34 INFO - "revision": "9888f1a23001fde6435e1a9ed7e6d3af8dd988d8",
09:20:34 INFO - "master": "http://buildbot-master110.bb.releng.scl3.mozilla.com:8201/",
09:20:34 INFO - "platform": "win32",
09:20:34 INFO - "branch": "fx-team",
09:20:34 INFO - "repo_path": "integration/fx-team",
09:20:34 INFO - "moz_repo_path": "",
09:20:34 INFO - "stage_platform": "win32",
09:20:34 INFO - "builduid": "b93a8759bd71498ea38b47e138e60cb2",
09:20:34 INFO - "slavebuilddir": "test"
09:20:34 INFO - }
09:20:34 INFO - Found a test packages url https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json.
09:20:34 INFO - Found installer url https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip.
09:20:34 INFO - Running post-action listener: _resource_record_post_action
09:20:34 INFO - [mozharness: 2016-10-27 17:20:34.651000Z] Finished read-buildbot-config step (success)
09:20:34 INFO - [mozharness: 2016-10-27 17:20:34.651000Z] Running download-and-extract step.
09:20:34 INFO - Running pre-action listener: _resource_record_pre_action
09:20:34 INFO - Running main action method: download_and_extract
09:20:34 INFO - mkdir: C:\slave\test\build\tests
09:20:34 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:20:34 INFO - trying https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json
09:20:34 INFO - Downloading https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json to C:\slave\test\build\firefox-52.0a1.en-US.win32.test_packages.json
09:20:34 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json', 'file_name': 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.test_packages.json'}, attempt #1
09:20:35 INFO - Downloaded 1274 bytes.
09:20:35 INFO - Reading from file C:\slave\test\build\firefox-52.0a1.en-US.win32.test_packages.json
09:20:35 INFO - Using the following test package requirements:
09:20:35 INFO - {u'common': [u'firefox-52.0a1.en-US.win32.common.tests.zip'],
09:20:35 INFO - u'cppunittest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:20:35 INFO - u'firefox-52.0a1.en-US.win32.cppunittest.tests.zip'],
09:20:35 INFO - u'gtest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:20:35 INFO - u'firefox-52.0a1.en-US.win32.gtest.tests.zip'],
09:20:35 INFO - u'jittest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:20:35 INFO - u'jsshell-win32.zip'],
09:20:35 INFO - u'mochitest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:20:35 INFO - u'firefox-52.0a1.en-US.win32.mochitest.tests.zip'],
09:20:35 INFO - u'mozbase': [u'firefox-52.0a1.en-US.win32.common.tests.zip'],
09:20:35 INFO - u'reftest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:20:35 INFO - u'firefox-52.0a1.en-US.win32.reftest.tests.zip'],
09:20:35 INFO - u'talos': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:20:35 INFO - u'firefox-52.0a1.en-US.win32.talos.tests.zip'],
09:20:35 INFO - u'web-platform': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:20:35 INFO - u'firefox-52.0a1.en-US.win32.web-platform.tests.zip'],
09:20:35 INFO - u'xpcshell': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:20:35 INFO - u'firefox-52.0a1.en-US.win32.xpcshell.tests.zip']}
09:20:35 INFO - Downloading packages: [u'firefox-52.0a1.en-US.win32.common.tests.zip', u'firefox-52.0a1.en-US.win32.web-platform.tests.zip'] for test suite category: web-platform
09:20:35 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip
09:20:35 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip'}, attempt #1
09:20:35 INFO - Fetch https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip into memory
09:20:35 INFO - Http code: 200
09:20:35 INFO - via: 1.1 ae162f6796e551002447afd7c07ec67a.cloudfront.net (CloudFront)
09:20:35 INFO - x-amz-cf-id: U1QrvlAeB9AH14x6jbhbLEHtx0dI3rBUIDve5Ld4mnywkfaT-oSUOg==
09:20:35 INFO - x-amz-version-id: tiNPr7Dm0.thKA5DjmjCyEVog3cTogU7
09:20:36 INFO - Expected file size: 18749558
09:20:36 INFO - Obtained file size: 18749558
09:20:38 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip
09:20:38 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip'}, attempt #1
09:20:38 INFO - Fetch https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip into memory
09:20:38 INFO - Http code: 200
09:20:38 INFO - via: 1.1 c54d7f08e2f3dab1918454910cc8aad0.cloudfront.net (CloudFront)
09:20:38 INFO - x-amz-cf-id: w9LL7gGY2wFD8H1Sv3i5F00H5984A6deIt2rONdoR79gOoOR8DxphA==
09:20:38 INFO - x-amz-version-id: FZmQdB9PaOrgsgD8ZpRfuZ2qwMwPk1Rt
09:20:40 INFO - Expected file size: 43222964
09:20:40 INFO - Obtained file size: 43222964
09:21:29 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:29 INFO - trying https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
09:21:29 INFO - Downloading https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip to C:\slave\test\build\firefox-52.0a1.en-US.win32.zip
09:21:29 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip', 'file_name': 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.zip'}, attempt #1
09:21:33 INFO - Downloaded 66380437 bytes.
09:21:33 INFO - Setting buildbot property build_url to https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
09:21:33 INFO - mkdir: C:\slave\test\properties
09:21:33 INFO - Writing buildbot properties ['build_url'] to C:\slave\test\properties\build_url
09:21:33 INFO - Writing to file C:\slave\test\properties\build_url
09:21:33 INFO - Contents:
09:21:33 INFO - build_url:https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
09:21:33 INFO - retry: Calling query_symbols_url with args: (), kwargs: {}, attempt #1
09:21:33 INFO - Setting buildbot property symbols_url to https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
09:21:33 INFO - Writing buildbot properties ['symbols_url'] to C:\slave\test\properties\symbols_url
09:21:33 INFO - Writing to file C:\slave\test\properties\symbols_url
09:21:33 INFO - Contents:
09:21:33 INFO - symbols_url:https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
09:21:33 INFO - Downloading and extracting to C:\slave\test\build\symbols these dirs * from https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
09:21:33 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip'}, attempt #1
09:21:33 INFO - Fetch https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip into memory
09:21:34 INFO - Http code: 200
09:21:34 INFO - via: 1.1 7f9e159e8ac7593f5d3d995abc6d2db3.cloudfront.net (CloudFront)
09:21:34 INFO - x-amz-cf-id: 4wWAtt8XskiUmzRWQJjKbU7ulKFls-SWl8y61RCGebmV8HZD26fcMA==
09:21:34 INFO - x-amz-version-id: AK0OloNw44GCvdzZf4icRMf_l17vLITl
09:21:37 INFO - Expected file size: 67649250
09:21:37 INFO - Obtained file size: 67649250
09:21:51 INFO - Running post-action listener: _resource_record_post_action
09:21:51 INFO - Running post-action listener: set_extra_try_arguments
09:21:51 INFO - [mozharness: 2016-10-27 17:21:51.011000Z] Finished download-and-extract step (success)
09:21:51 INFO - [mozharness: 2016-10-27 17:21:51.011000Z] Running fetch-geckodriver step.
09:21:51 INFO - Running pre-action listener: _resource_record_pre_action
09:21:51 INFO - Running main action method: fetch_geckodriver
09:21:51 INFO - Running post-action listener: _resource_record_post_action
09:21:51 INFO - [mozharness: 2016-10-27 17:21:51.011000Z] Finished fetch-geckodriver step (success)
09:21:51 INFO - [mozharness: 2016-10-27 17:21:51.011000Z] Running create-virtualenv step.
09:21:51 INFO - Running pre-action listener: _pre_create_virtualenv
09:21:51 INFO - Running pre-action listener: _resource_record_pre_action
09:21:51 INFO - Running main action method: create_virtualenv
09:21:51 INFO - Creating virtualenv C:\slave\test\build\venv
09:21:51 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'c:/mozilla-build/buildbotve/virtualenv.py', '--no-site-packages', '--distribute', 'C:\\slave\\test\\build\\venv'] in C:\slave\test\build
09:21:51 INFO - Copy/paste: c:\mozilla-build\python27\python.exe c:/mozilla-build/buildbotve/virtualenv.py --no-site-packages --distribute C:\slave\test\build\venv
09:21:52 INFO - New python executable in C:\slave\test\build\venv\Scripts\python.exe
09:21:53 INFO - Installing distribute......................................................................................................................................................................................done.
09:21:54 INFO - Return code: 0
09:21:54 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', '--version']
09:21:54 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip --version
09:21:55 INFO - Reading from file tmpfile_stdout
09:21:55 INFO - Output received:
09:21:55 INFO - pip 0.8.2 from c:\slave\test\build\venv\lib\site-packages\pip-0.8.2-py2.7.egg (python 2.7)
09:21:55 INFO - Using _rmtree_windows ...
09:21:55 INFO - Using _rmtree_windows ...
09:21:55 INFO - Installing psutil>=3.1.1 into virtualenv C:\slave\test\build\venv
09:21:55 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:55 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:21:55 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:55 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:21:55 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00DF2250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00FD2020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CEA4C0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00DFC480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-111', 'USERDOMAIN': 'T-XP32-IX-111', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-111', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111'}}, attempt #1
09:21:55 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1'] in C:\slave\test\build
09:21:55 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1
09:21:55 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
09:21:55 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data',
09:21:55 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:21:55 INFO - 'COMPUTERNAME': 'T-XP32-IX-111',
09:21:55 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
09:21:55 INFO - 'DCLOCATION': 'SCL3',
09:21:55 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:21:55 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:21:55 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:21:55 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:21:55 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:21:55 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:21:55 INFO - 'HOMEDRIVE': 'C:',
09:21:55 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:55 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:21:55 INFO - 'KTS_VERSION': '1.19c',
09:21:55 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:21:55 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-111',
09:21:55 INFO - 'MONDIR': 'C:\\Monitor_config\\',
09:21:55 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
09:21:55 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:21:55 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:21:55 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:21:55 INFO - 'MOZ_AIRBAG': '1',
09:21:55 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:21:55 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:21:55 INFO - 'MOZ_MSVCVERSION': '8',
09:21:55 INFO - 'MOZ_NO_REMOTE': '1',
09:21:55 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:21:55 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:21:55 INFO - 'NO_EM_RESTART': '1',
09:21:55 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:21:55 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:21:55 INFO - 'OS': 'Windows_NT',
09:21:55 INFO - 'OURDRIVE': 'C:',
09:21:55 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
09:21:55 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
09:21:55 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:21:55 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
09:21:55 INFO - 'PROCESSOR_LEVEL': '6',
09:21:55 INFO - 'PROCESSOR_REVISION': '1e05',
09:21:55 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:21:55 INFO - 'PROMPT': '$P$G',
09:21:55 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:21:55 INFO - 'PWD': 'C:\\slave\\test',
09:21:55 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
09:21:55 INFO - 'SESSIONNAME': 'Console',
09:21:55 INFO - 'SLAVEDIR': 'C:\\slave\\',
09:21:55 INFO - 'SYSTEMDRIVE': 'C:',
09:21:55 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
09:21:55 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:55 INFO - 'TEST1': 'testie',
09:21:55 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:55 INFO - 'USERDOMAIN': 'T-XP32-IX-111',
09:21:55 INFO - 'USERNAME': 'cltbld',
09:21:55 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:55 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:21:55 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:21:55 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:21:55 INFO - 'WINDIR': 'C:\\WINDOWS',
09:21:55 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:21:55 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:21:55 INFO - Downloading/unpacking psutil>=3.1.1
09:21:55 INFO - Running setup.py egg_info for package psutil
09:21:55 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
09:21:55 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects
...
09:21:55 INFO - Installing collected packages: psutil
09:21:55 INFO - Running setup.py install for psutil
09:21:55 INFO - building 'psutil._psutil_windows' extension
09:21:55 INFO - error: Unable to find vcvarsall.bat
09:21:55 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-2ctpco-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7:
09:21:55 INFO - running install
09:21:55 INFO - running build
09:21:55 INFO - running build_py
09:21:55 INFO - creating build
09:21:55 INFO - creating build\lib.win32-2.7
09:21:55 INFO - creating build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\_common.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\_compat.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\_psbsd.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\_pslinux.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\_psosx.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\_psposix.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\_pssunos.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\_pswindows.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - copying psutil\__init__.py -> build\lib.win32-2.7\psutil
09:21:55 INFO - running build_ext
09:21:55 INFO - building 'psutil._psutil_windows' extension
09:21:55 INFO - error: Unable to find vcvarsall.bat
09:21:55 INFO - ----------------------------------------
09:21:55 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-2ctpco-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1
09:21:55 INFO - Storing complete log in C:\Documents and Settings\cltbld.T-XP32-IX-111\Application Data\pip\pip.log
09:21:55 WARNING - Return code: 1
09:21:55 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1 failed after 1 tries!
09:21:55 INFO - Installing mozsystemmonitor==0.3 into virtualenv C:\slave\test\build\venv
09:21:55 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:55 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:21:55 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:55 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:21:55 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00DF2250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00FD2020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CEA4C0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00DFC480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-111', 'USERDOMAIN': 'T-XP32-IX-111', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-111', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111'}}, attempt #1
09:21:55 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3'] in C:\slave\test\build
09:21:55 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3
09:21:55 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
09:21:55 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data',
09:21:55 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:21:55 INFO - 'COMPUTERNAME': 'T-XP32-IX-111',
09:21:55 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
09:21:55 INFO - 'DCLOCATION': 'SCL3',
09:21:55 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:21:55 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:21:55 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:21:55 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:21:55 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:21:55 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:21:55 INFO - 'HOMEDRIVE': 'C:',
09:21:55 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:55 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:21:55 INFO - 'KTS_VERSION': '1.19c',
09:21:55 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:21:55 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-111',
09:21:55 INFO - 'MONDIR': 'C:\\Monitor_config\\',
09:21:55 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
09:21:55 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:21:55 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:21:55 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:21:55 INFO - 'MOZ_AIRBAG': '1',
09:21:55 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:21:55 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:21:55 INFO - 'MOZ_MSVCVERSION': '8',
09:21:55 INFO - 'MOZ_NO_REMOTE': '1',
09:21:55 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:21:55 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:21:55 INFO - 'NO_EM_RESTART': '1',
09:21:55 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:21:55 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:21:55 INFO - 'OS': 'Windows_NT',
09:21:55 INFO - 'OURDRIVE': 'C:',
09:21:55 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
09:21:55 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
09:21:55 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:21:55 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
09:21:55 INFO - 'PROCESSOR_LEVEL': '6',
09:21:55 INFO - 'PROCESSOR_REVISION': '1e05',
09:21:55 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:21:55 INFO - 'PROMPT': '$P$G',
09:21:55 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:21:55 INFO - 'PWD': 'C:\\slave\\test',
09:21:55 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
09:21:55 INFO - 'SESSIONNAME': 'Console',
09:21:55 INFO - 'SLAVEDIR': 'C:\\slave\\',
09:21:55 INFO - 'SYSTEMDRIVE': 'C:',
09:21:55 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
09:21:55 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:55 INFO - 'TEST1': 'testie',
09:21:55 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:55 INFO - 'USERDOMAIN': 'T-XP32-IX-111',
09:21:55 INFO - 'USERNAME': 'cltbld',
09:21:55 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:55 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:21:55 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:21:55 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:21:55 INFO - 'WINDIR': 'C:\\WINDOWS',
09:21:55 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:21:57 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:21:57 INFO - Downloading/unpacking mozsystemmonitor==0.3
09:21:57 INFO - Downloading mozsystemmonitor-0.3.tar.gz
09:21:57 INFO - Running setup.py egg_info for package mozsystemmonitor
09:21:57 INFO - Downloading/unpacking psutil>=3.1.1 (from mozsystemmonitor==0.3)
09:21:57 INFO - Running setup.py egg_info for package psutil
09:21:57 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
09:21:57 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects ...
09:21:57 INFO - Installing collected packages: mozsystemmonitor, psutil
09:21:57 INFO - Running setup.py install for mozsystemmonitor
09:21:57 INFO - Running setup.py install for psutil
09:21:57 INFO - building 'psutil._psutil_windows' extension
09:21:57 INFO - error: Unable to find vcvarsall.bat
09:21:57 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-nuj15a-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7:
09:21:57 INFO - running install
09:21:57 INFO - running build
09:21:57 INFO - running build_py
09:21:57 INFO - running build_ext
09:21:57 INFO - building 'psutil._psutil_windows' extension
09:21:57 INFO - error: Unable to find vcvarsall.bat
09:21:57 INFO - ----------------------------------------
09:21:57 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-nuj15a-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1
09:21:57 INFO - Storing complete log in C:\Documents and Settings\cltbld.T-XP32-IX-111\Application Data\pip\pip.log
09:21:57 WARNING - Return code: 1
09:21:57 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3 failed after 1 tries!
09:21:57 INFO - Installing jsonschema==2.5.1 into virtualenv C:\slave\test\build\venv
09:21:57 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:57 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:21:57 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:57 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:21:57 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00DF2250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00FD2020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CEA4C0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00DFC480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-111', 'USERDOMAIN': 'T-XP32-IX-111', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-111', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111'}}, attempt #1
09:21:57 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1'] in C:\slave\test\build
09:21:57 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub jsonschema==2.5.1
09:21:57 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
09:21:57 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data',
09:21:57 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:21:57 INFO - 'COMPUTERNAME': 'T-XP32-IX-111',
09:21:57 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
09:21:57 INFO - 'DCLOCATION': 'SCL3',
09:21:57 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:21:57 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:21:57 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:21:57 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:21:57 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:21:57 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:21:57 INFO - 'HOMEDRIVE': 'C:',
09:21:57 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:57 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:21:57 INFO - 'KTS_VERSION': '1.19c',
09:21:57 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:21:57 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-111',
09:21:57 INFO - 'MONDIR': 'C:\\Monitor_config\\',
09:21:57 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
09:21:57 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:21:57 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:21:57 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:21:57 INFO - 'MOZ_AIRBAG': '1',
09:21:57 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:21:57 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:21:57 INFO - 'MOZ_MSVCVERSION': '8',
09:21:57 INFO - 'MOZ_NO_REMOTE': '1',
09:21:57 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:21:57 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:21:57 INFO - 'NO_EM_RESTART': '1',
09:21:57 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:21:57 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:21:57 INFO - 'OS': 'Windows_NT',
09:21:57 INFO - 'OURDRIVE': 'C:',
09:21:57 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
09:21:57 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
09:21:57 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:21:57 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
09:21:57 INFO - 'PROCESSOR_LEVEL': '6',
09:21:57 INFO - 'PROCESSOR_REVISION': '1e05',
09:21:57 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:21:57 INFO - 'PROMPT': '$P$G',
09:21:57 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:21:57 INFO - 'PWD': 'C:\\slave\\test',
09:21:57 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
09:21:57 INFO - 'SESSIONNAME': 'Console',
09:21:57 INFO - 'SLAVEDIR': 'C:\\slave\\',
09:21:57 INFO - 'SYSTEMDRIVE': 'C:',
09:21:57 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
09:21:57 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:57 INFO - 'TEST1': 'testie',
09:21:57 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:57 INFO - 'USERDOMAIN': 'T-XP32-IX-111',
09:21:57 INFO - 'USERNAME': 'cltbld',
09:21:57 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:57 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:21:57 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:21:57 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:21:57 INFO - 'WINDIR': 'C:\\WINDOWS',
09:21:57 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:21:57 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:21:57 INFO - Downloading/unpacking jsonschema==2.5.1
09:21:58 INFO - Running setup.py egg_info for package jsonschema
09:21:58 INFO - zip_safe flag not set; analyzing archive contents...
09:21:58 INFO - install_dir .
09:21:58 INFO - Installed c:\slave\test\build\venv\build\jsonschema\vcversioner-2.16.0.0-py2.7.egg
09:21:58 INFO - Installing collected packages: jsonschema
09:21:58 INFO - Running setup.py install for jsonschema
09:21:58 INFO - Installing jsonschema-script.py script to C:\slave\test\build\venv\Scripts
09:21:58 INFO - Installing jsonschema.exe script to C:\slave\test\build\venv\Scripts
09:21:58 INFO - Successfully installed jsonschema
09:21:58 INFO - Cleaning up...
09:21:58 INFO - Return code: 0
09:21:58 INFO - Installing functools32==3.2.3-2 into virtualenv C:\slave\test\build\venv
09:21:58 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:58 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:21:58 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:58 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:21:58 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00DF2250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00FD2020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CEA4C0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00DFC480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-111', 'USERDOMAIN': 'T-XP32-IX-111', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-111', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111'}}, attempt #1
09:21:58 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2'] in C:\slave\test\build
09:21:58 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub functools32==3.2.3-2
09:21:58 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
09:21:58 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data',
09:21:58 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:21:58 INFO - 'COMPUTERNAME': 'T-XP32-IX-111',
09:21:58 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
09:21:58 INFO - 'DCLOCATION': 'SCL3',
09:21:58 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:21:58 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:21:58 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:21:58 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:21:58 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:21:58 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:21:58 INFO - 'HOMEDRIVE': 'C:',
09:21:58 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:58 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:21:58 INFO - 'KTS_VERSION': '1.19c',
09:21:58 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:21:58 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-111',
09:21:58 INFO - 'MONDIR': 'C:\\Monitor_config\\',
09:21:58 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
09:21:58 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:21:58 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:21:58 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:21:58 INFO - 'MOZ_AIRBAG': '1',
09:21:58 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:21:58 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:21:58 INFO - 'MOZ_MSVCVERSION': '8',
09:21:58 INFO - 'MOZ_NO_REMOTE': '1',
09:21:58 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:21:58 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:21:58 INFO - 'NO_EM_RESTART': '1',
09:21:58 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:21:58 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:21:58 INFO - 'OS': 'Windows_NT',
09:21:58 INFO - 'OURDRIVE': 'C:',
09:21:58 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
09:21:58 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
09:21:58 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:21:58 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
09:21:58 INFO - 'PROCESSOR_LEVEL': '6',
09:21:58 INFO - 'PROCESSOR_REVISION': '1e05',
09:21:58 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:21:58 INFO - 'PROMPT': '$P$G',
09:21:58 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:21:58 INFO - 'PWD': 'C:\\slave\\test',
09:21:58 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
09:21:58 INFO - 'SESSIONNAME': 'Console',
09:21:58 INFO - 'SLAVEDIR': 'C:\\slave\\',
09:21:58 INFO - 'SYSTEMDRIVE': 'C:',
09:21:58 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
09:21:58 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:58 INFO - 'TEST1': 'testie',
09:21:58 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:58 INFO - 'USERDOMAIN': 'T-XP32-IX-111',
09:21:58 INFO - 'USERNAME': 'cltbld',
09:21:58 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:58 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:21:58 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:21:58 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:21:58 INFO - 'WINDIR': 'C:\\WINDOWS',
09:21:58 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:21:59 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:21:59 INFO - Downloading/unpacking functools32==3.2.3-2
09:21:59 INFO - Downloading functools32-3.2.3-2.tar.gz
09:21:59 INFO - Running setup.py egg_info for package functools32
09:21:59 INFO - warning: no files found matching '*.txt'
09:21:59 INFO - no previously-included directories found matching 'build'
09:21:59 INFO - no previously-included directories found matching 'dist'
09:21:59 INFO - no previously-included directories found matching '.git*'
09:21:59 INFO - Installing collected packages: functools32
09:21:59 INFO - Running setup.py install for functools32
09:21:59 INFO - warning: no files found matching '*.txt'
09:21:59 INFO - no previously-included directories found matching 'build'
09:21:59 INFO - no previously-included directories found matching 'dist'
09:21:59 INFO - no previously-included directories found matching '.git*'
09:21:59 INFO - Successfully installed functools32
09:21:59 INFO - Cleaning up...
09:21:59 INFO - Return code: 0
09:21:59 INFO - Installing blobuploader==1.2.4 into virtualenv C:\slave\test\build\venv
09:21:59 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:59 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:21:59 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:21:59 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:21:59 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00DF2250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00FD2020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CEA4C0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00DFC480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-111', 'USERDOMAIN': 'T-XP32-IX-111', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-111', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111'}}, attempt #1
09:21:59 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4'] in C:\slave\test\build
09:21:59 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub blobuploader==1.2.4
09:21:59 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
09:21:59 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data',
09:21:59 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:21:59 INFO - 'COMPUTERNAME': 'T-XP32-IX-111',
09:21:59 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
09:21:59 INFO - 'DCLOCATION': 'SCL3',
09:21:59 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:21:59 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:21:59 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:21:59 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:21:59 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:21:59 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:21:59 INFO - 'HOMEDRIVE': 'C:',
09:21:59 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:59 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:21:59 INFO - 'KTS_VERSION': '1.19c',
09:21:59 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:21:59 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-111',
09:21:59 INFO - 'MONDIR': 'C:\\Monitor_config\\',
09:21:59 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
09:21:59 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:21:59 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:21:59 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:21:59 INFO - 'MOZ_AIRBAG': '1',
09:21:59 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:21:59 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:21:59 INFO - 'MOZ_MSVCVERSION': '8',
09:21:59 INFO - 'MOZ_NO_REMOTE': '1',
09:21:59 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:21:59 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:21:59 INFO - 'NO_EM_RESTART': '1',
09:21:59 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:21:59 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:21:59 INFO - 'OS': 'Windows_NT',
09:21:59 INFO - 'OURDRIVE': 'C:',
09:21:59 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
09:21:59 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
09:21:59 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:21:59 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
09:21:59 INFO - 'PROCESSOR_LEVEL': '6',
09:21:59 INFO - 'PROCESSOR_REVISION': '1e05',
09:21:59 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:21:59 INFO - 'PROMPT': '$P$G',
09:21:59 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:21:59 INFO - 'PWD': 'C:\\slave\\test',
09:21:59 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
09:21:59 INFO - 'SESSIONNAME': 'Console',
09:21:59 INFO - 'SLAVEDIR': 'C:\\slave\\',
09:21:59 INFO - 'SYSTEMDRIVE': 'C:',
09:21:59 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
09:21:59 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:59 INFO - 'TEST1': 'testie',
09:21:59 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:21:59 INFO - 'USERDOMAIN': 'T-XP32-IX-111',
09:21:59 INFO - 'USERNAME': 'cltbld',
09:21:59 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:21:59 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:21:59 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:21:59 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:21:59 INFO - 'WINDIR': 'C:\\WINDOWS',
09:21:59 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:22:00 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:22:00 INFO - Downloading/unpacking blobuploader==1.2.4
09:22:00 INFO - Downloading blobuploader-1.2.4.tar.gz
09:22:00 INFO - Running setup.py egg_info for package blobuploader
09:22:00 INFO - Downloading/unpacking requests==1.2.3. (from blobuploader==1.2.4)
09:22:02 INFO - Running setup.py egg_info for package requests
09:22:02 INFO - Downloading/unpacking docopt==0.6.1 (from blobuploader==1.2.4)
09:22:02 INFO - Downloading docopt-0.6.1.tar.gz
09:22:02 INFO - Running setup.py egg_info for package docopt
09:22:02 INFO - Installing collected packages: blobuploader, docopt, requests
09:22:02 INFO - Running setup.py install for blobuploader
09:22:02 INFO - Running setup.py install for docopt
09:22:02 INFO - Running setup.py install for requests
09:22:02 INFO - Successfully installed blobuploader docopt requests
09:22:02 INFO - Cleaning up...
09:22:02 INFO - Return code: 0
09:22:02 INFO - Installing None into virtualenv C:\slave\test\build\venv
09:22:02 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:22:02 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:22:02 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:22:02 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:22:02 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00DF2250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00FD2020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CEA4C0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00DFC480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-111', 'USERDOMAIN': 'T-XP32-IX-111', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-111', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111'}}, attempt #1
09:22:02 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config
09:22:02 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --no-deps --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
09:22:02 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
09:22:02 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data',
09:22:02 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:22:02 INFO - 'COMPUTERNAME': 'T-XP32-IX-111',
09:22:02 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
09:22:02 INFO - 'DCLOCATION': 'SCL3',
09:22:02 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:22:02 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:22:02 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:22:02 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:22:02 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:22:02 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:22:02 INFO - 'HOMEDRIVE': 'C:',
09:22:02 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:22:02 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:22:02 INFO - 'KTS_VERSION': '1.19c',
09:22:02 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:22:02 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-111',
09:22:02 INFO - 'MONDIR': 'C:\\Monitor_config\\',
09:22:02 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
09:22:02 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:22:02 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:22:02 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:22:02 INFO - 'MOZ_AIRBAG': '1',
09:22:02 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:22:02 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:22:02 INFO - 'MOZ_MSVCVERSION': '8',
09:22:02 INFO - 'MOZ_NO_REMOTE': '1',
09:22:02 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:22:02 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:22:02 INFO - 'NO_EM_RESTART': '1',
09:22:02 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:22:02 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:22:02 INFO - 'OS': 'Windows_NT',
09:22:02 INFO - 'OURDRIVE': 'C:',
09:22:02 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
09:22:02 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
09:22:02 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:22:02 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
09:22:02 INFO - 'PROCESSOR_LEVEL': '6',
09:22:02 INFO - 'PROCESSOR_REVISION': '1e05',
09:22:02 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:22:02 INFO - 'PROMPT': '$P$G',
09:22:02 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:22:02 INFO - 'PWD': 'C:\\slave\\test',
09:22:02 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
09:22:02 INFO - 'SESSIONNAME': 'Console',
09:22:02 INFO - 'SLAVEDIR': 'C:\\slave\\',
09:22:02 INFO - 'SYSTEMDRIVE': 'C:',
09:22:02 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
09:22:02 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:22:02 INFO - 'TEST1': 'testie',
09:22:02 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:22:02 INFO - 'USERDOMAIN': 'T-XP32-IX-111',
09:22:02 INFO - 'USERNAME': 'cltbld',
09:22:02 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:22:02 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:22:02 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:22:02 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:22:02 INFO - 'WINDIR': 'C:\\WINDOWS',
09:22:02 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:22:08 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
09:22:08 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
09:22:08 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
09:22:08 INFO - Unpacking c:\slave\test\build\tests\marionette\client
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
09:22:08 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
09:22:08 INFO - Unpacking c:\slave\test\build\tests\marionette
09:22:08 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette
09:22:08 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
09:22:08 INFO - Installing collected packages: browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozfile, mozhttpd, mozinfo, mozInstall, mozleak, mozlog, moznetwork, mozprocess, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
09:22:08 INFO - Running setup.py install for browsermob-proxy
09:22:16 INFO - Running setup.py install for manifestparser
09:22:16 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for marionette-client
09:22:16 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
09:22:16 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for marionette-driver
09:22:16 INFO - Running setup.py install for mozcrash
09:22:16 INFO - Running setup.py install for mozdebug
09:22:16 INFO - Running setup.py install for mozdevice
09:22:16 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for mozfile
09:22:16 INFO - Running setup.py install for mozhttpd
09:22:16 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for mozinfo
09:22:16 INFO - Installing mozinfo-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozinfo.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for mozInstall
09:22:16 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for mozleak
09:22:16 INFO - Running setup.py install for mozlog
09:22:16 INFO - Installing structlog-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing structlog.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for moznetwork
09:22:16 INFO - Installing moznetwork-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing moznetwork.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for mozprocess
09:22:16 INFO - Running setup.py install for mozprofile
09:22:16 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for mozrunner
09:22:16 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for mozscreenshot
09:22:16 INFO - Running setup.py install for moztest
09:22:16 INFO - Running setup.py install for mozversion
09:22:16 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts
09:22:16 INFO - Running setup.py install for wptserve
09:22:16 INFO - Successfully installed browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozfile mozhttpd mozinfo mozInstall mozleak mozlog moznetwork mozprocess mozprofile mozrunner mozscreenshot moztest mozversion wptserve
09:22:16 INFO - Cleaning up...
09:22:16 INFO - Return code: 0
09:22:16 INFO - Installing None into virtualenv C:\slave\test\build\venv
09:22:16 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:22:16 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:22:16 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:22:16 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:22:16 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00DF2250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00FD2020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CEA4C0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00DFC480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-111', 'USERDOMAIN': 'T-XP32-IX-111', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-111', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111'}}, attempt #1
09:22:16 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config
09:22:16 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
09:22:16 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
09:22:16 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data',
09:22:16 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:22:16 INFO - 'COMPUTERNAME': 'T-XP32-IX-111',
09:22:16 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
09:22:16 INFO - 'DCLOCATION': 'SCL3',
09:22:16 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:22:16 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:22:16 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:22:16 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:22:16 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:22:16 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:22:16 INFO - 'HOMEDRIVE': 'C:',
09:22:16 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:22:16 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:22:16 INFO - 'KTS_VERSION': '1.19c',
09:22:16 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:22:16 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-111',
09:22:16 INFO - 'MONDIR': 'C:\\Monitor_config\\',
09:22:16 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
09:22:16 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:22:16 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:22:16 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:22:16 INFO - 'MOZ_AIRBAG': '1',
09:22:16 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:22:16 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:22:16 INFO - 'MOZ_MSVCVERSION': '8',
09:22:16 INFO - 'MOZ_NO_REMOTE': '1',
09:22:16 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:22:16 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:22:16 INFO - 'NO_EM_RESTART': '1',
09:22:16 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:22:16 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:22:16 INFO - 'OS': 'Windows_NT',
09:22:16 INFO - 'OURDRIVE': 'C:',
09:22:16 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
09:22:16 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
09:22:16 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:22:16 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
09:22:16 INFO - 'PROCESSOR_LEVEL': '6',
09:22:16 INFO - 'PROCESSOR_REVISION': '1e05',
09:22:16 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:22:16 INFO - 'PROMPT': '$P$G',
09:22:16 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:22:16 INFO - 'PWD': 'C:\\slave\\test',
09:22:16 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
09:22:16 INFO - 'SESSIONNAME': 'Console',
09:22:16 INFO - 'SLAVEDIR': 'C:\\slave\\',
09:22:16 INFO - 'SYSTEMDRIVE': 'C:',
09:22:16 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
09:22:16 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:22:16 INFO - 'TEST1': 'testie',
09:22:16 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:22:16 INFO - 'USERDOMAIN': 'T-XP32-IX-111',
09:22:16 INFO - 'USERNAME': 'cltbld',
09:22:16 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:22:16 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:22:16 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:22:16 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:22:16 INFO - 'WINDIR': 'C:\\WINDOWS',
09:22:16 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:22:21 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
09:22:21 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
09:22:21 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
09:22:21 INFO - Unpacking c:\slave\test\build\tests\marionette\client
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
09:22:21 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
09:22:21 INFO - Unpacking c:\slave\test\build\tests\marionette
09:22:21 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette
09:22:21 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
09:22:21 INFO - Requirement already satisfied (use --upgrade to upgrade): mozfile>=1.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
09:22:26 INFO - Requirement already satisfied (use --upgrade to upgrade): mozlog>=3.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
09:22:26 INFO - Requirement already satisfied (use --upgrade to upgrade): mozinfo in c:\slave\test\build\venv\lib\site-packages (from mozdebug->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 3))
09:22:26 INFO - Requirement already satisfied (use --upgrade to upgrade): moznetwork>=0.24 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
09:22:26 INFO - Requirement already satisfied (use --upgrade to upgrade): mozprocess>=0.19 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
09:22:26 INFO - Downloading/unpacking blessings>=1.3 (from mozlog->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 10))
09:22:26 INFO - Downloading blessings-1.6.tar.gz
09:22:26 INFO - Running setup.py egg_info for package blessings
09:22:26 INFO - Requirement already satisfied (use --upgrade to upgrade): requests>=1.1.0 in c:\slave\test\build\venv\lib\site-packages (from browsermob-proxy->-r C:\slave\test\build\tests\config\marionette_requirements.txt (line 4))
09:22:26 INFO - Installing collected packages: blessings, browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozhttpd, mozInstall, mozleak, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
09:22:26 INFO - Running setup.py install for blessings
09:22:26 INFO - Running setup.py install for browsermob-proxy
09:22:26 INFO - Running setup.py install for manifestparser
09:22:26 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Running setup.py install for marionette-client
09:22:26 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
09:22:26 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Running setup.py install for marionette-driver
09:22:26 INFO - Running setup.py install for mozcrash
09:22:26 INFO - Running setup.py install for mozdebug
09:22:26 INFO - Running setup.py install for mozdevice
09:22:26 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Running setup.py install for mozhttpd
09:22:26 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Running setup.py install for mozInstall
09:22:26 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Running setup.py install for mozleak
09:22:26 INFO - Running setup.py install for mozprofile
09:22:26 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Running setup.py install for mozrunner
09:22:26 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts
09:22:26 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts
09:22:28 INFO - Running setup.py install for mozscreenshot
09:22:28 INFO - Running setup.py install for moztest
09:22:28 INFO - Running setup.py install for mozversion
09:22:28 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts
09:22:28 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts
09:22:28 INFO - Running setup.py install for wptserve
09:22:28 INFO - Successfully installed blessings browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozhttpd mozInstall mozleak mozprofile mozrunner mozscreenshot moztest mozversion wptserve
09:22:28 INFO - Cleaning up...
09:22:28 INFO - Return code: 0
09:22:28 INFO - Done creating virtualenv C:\slave\test\build\venv.
09:22:28 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
09:22:28 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze
09:22:28 INFO - Reading from file tmpfile_stdout
09:22:28 INFO - Using _rmtree_windows ...
09:22:28 INFO - Using _rmtree_windows ...
09:22:28 INFO - Current package versions:
09:22:28 INFO - blessings == 1.6
09:22:28 INFO - blobuploader == 1.2.4
09:22:28 INFO - browsermob-proxy == 0.6.0
09:22:28 INFO - distribute == 0.6.14
09:22:28 INFO - docopt == 0.6.1
09:22:28 INFO - functools32 == 3.2.3-2
09:22:28 INFO - jsonschema == 2.5.1
09:22:28 INFO - manifestparser == 1.1
09:22:28 INFO - marionette-client == 3.2.0
09:22:28 INFO - marionette-driver == 2.1.0
09:22:28 INFO - mozInstall == 1.12
09:22:28 INFO - mozcrash == 0.17
09:22:28 INFO - mozdebug == 0.1
09:22:28 INFO - mozdevice == 0.48
09:22:28 INFO - mozfile == 1.2
09:22:28 INFO - mozhttpd == 0.7
09:22:28 INFO - mozinfo == 0.9
09:22:28 INFO - mozleak == 0.1
09:22:28 INFO - mozlog == 3.4
09:22:28 INFO - moznetwork == 0.27
09:22:28 INFO - mozprocess == 0.23
09:22:28 INFO - mozprofile == 0.28
09:22:28 INFO - mozrunner == 6.12
09:22:28 INFO - mozscreenshot == 0.1
09:22:28 INFO - mozsystemmonitor == 0.3
09:22:28 INFO - moztest == 0.7
09:22:28 INFO - mozversion == 1.4
09:22:28 INFO - requests == 1.2.3
09:22:28 INFO - wptserve == 1.4.0
09:22:28 INFO - Running post-action listener: _resource_record_post_action
09:22:28 INFO - Running post-action listener: _start_resource_monitoring
09:22:28 INFO - Starting resource monitoring.
09:22:28 INFO - [mozharness: 2016-10-27 17:22:28.680000Z] Finished create-virtualenv step (success)
09:22:28 INFO - [mozharness: 2016-10-27 17:22:28.680000Z] Running pull step.
09:22:28 INFO - Running pre-action listener: _resource_record_pre_action
09:22:28 INFO - Running main action method: pull
09:22:28 INFO - Pull has nothing to do!
09:22:28 INFO - Running post-action listener: _resource_record_post_action
09:22:28 INFO - [mozharness: 2016-10-27 17:22:28.680000Z] Finished pull step (success)
09:22:28 INFO - [mozharness: 2016-10-27 17:22:28.680000Z] Running install step.
09:22:28 INFO - Running pre-action listener: _resource_record_pre_action
09:22:28 INFO - Running main action method: install
09:22:28 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
09:22:28 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze
09:22:29 INFO - Reading from file tmpfile_stdout
09:22:29 INFO - Using _rmtree_windows ...
09:22:29 INFO - Using _rmtree_windows ...
09:22:29 INFO - Detecting whether we're running mozinstall >=1.0...
09:22:29 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', '-h']
09:22:29 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py -h
09:22:29 INFO - Reading from file tmpfile_stdout
09:22:29 INFO - Output received:
09:22:29 INFO - Usage: mozinstall-script.py [options] installer
09:22:29 INFO - Options:
09:22:29 INFO - -h, --help show this help message and exit
09:22:29 INFO - -d DEST, --destination=DEST
09:22:29 INFO - Directory to install application into. [default:
09:22:29 INFO - "C:\slave\test"]
09:22:29 INFO - --app=APP Application being installed. [default: firefox]
09:22:29 INFO - Using _rmtree_windows ...
09:22:29 INFO - Using _rmtree_windows ...
09:22:29 INFO - mkdir: C:\slave\test\build\application
09:22:29 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.zip', '--destination', 'C:\\slave\\test\\build\\application']
09:22:29 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py C:\slave\test\build\firefox-52.0a1.en-US.win32.zip --destination C:\slave\test\build\application
09:22:32 INFO - Reading from file tmpfile_stdout
09:22:32 INFO - Output received:
09:22:32 INFO - C:\slave\test\build\application\firefox\firefox.exe
09:22:32 INFO - Using _rmtree_windows ...
09:22:32 INFO - Using _rmtree_windows ...
09:22:32 INFO - Running post-action listener: _resource_record_post_action
09:22:32 INFO - [mozharness: 2016-10-27 17:22:32.824000Z] Finished install step (success)
09:22:32 INFO - [mozharness: 2016-10-27 17:22:32.824000Z] Running run-tests step.
09:22:32 INFO - Running pre-action listener: _resource_record_pre_action
09:22:32 INFO - Running main action method: run_tests
09:22:32 INFO - mkdir: C:\slave\test\build\blobber_upload_dir
09:22:32 INFO - Minidump filename unknown. Determining based upon platform and architecture.
09:22:32 INFO - Minidump tooltool manifest unknown. Determining based upon platform and architecture.
09:22:32 INFO - grabbing minidump binary from tooltool
09:22:32 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:22:32 INFO - retry: Calling run_command with args: (['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'],), kwargs: {'output_timeout': 600, 'error_list': [{'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0102A180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00DFC480>, 'level': 'critical'}, {'substr': 'ERROR - ', 'level': 'error'}], 'cwd': 'C:\\slave\\test\\build', 'privileged': False}, attempt #1
09:22:32 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] in C:\slave\test\build
09:22:32 INFO - Copy/paste: c:\mozilla-build\python27\python.exe C:/mozilla-build/tooltool.py --url https://api.pub.build.mozilla.org/tooltool/ --authentication-file c:\builds\relengapi.tok fetch -m C:\slave\test\build\tests\config/tooltool-manifests/win32/releng.manifest -o
09:22:32 INFO - Calling ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] with output_timeout 600
09:22:33 INFO - INFO - Attempting to fetch from 'https://api.pub.build.mozilla.org/tooltool/'...
09:22:34 INFO - INFO - File win32-minidump_stackwalk.exe fetched from https://api.pub.build.mozilla.org/tooltool/ as C:\slave\test\build\tmpwkzybe
09:22:34 INFO - INFO - File integrity verified, renaming tmpwkzybe to win32-minidump_stackwalk.exe
09:22:34 INFO - Return code: 0
09:22:34 INFO - Chmoding C:\slave\test\build\win32-minidump_stackwalk.exe to 0755
09:22:34 INFO - ENV: MINIDUMP_SAVE_PATH is now C:\slave\test\build\blobber_upload_dir
09:22:34 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=C:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=9', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] in C:\slave\test\build
09:22:34 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\python -u C:\slave\test\build\tests\web-platform\runtests.py --log-raw=- --log-raw=C:\slave\test\build\blobber_upload_dir\wpt_raw.log --log-errorsummary=C:\slave\test\build\blobber_upload_dir\wpt_errorsummary.log --binary=C:\slave\test\build\application\firefox\firefox.exe --symbols-path=https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip --stackwalk-binary=C:\slave\test\build\win32-minidump_stackwalk.exe --stackfix-dir=C:\slave\test\build\tests\bin --test-type=testharness --disable-e10s --total-chunks=10 --this-chunk=9 --prefs-root=C:\slave\test\build\tests\web-platform/prefs --processes=1 --config=C:\slave\test\build\tests\web-platform/wptrunner.ini --ca-cert-path=C:\slave\test\build\tests\web-platform/certs/cacert.pem --host-key-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.key --host-cert-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.pem --certutil-binary=C:\slave\test\build\tests/bin/certutil
09:22:34 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users',
09:22:34 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111\\Application Data',
09:22:34 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:22:34 INFO - 'COMPUTERNAME': 'T-XP32-IX-111',
09:22:34 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe',
09:22:34 INFO - 'DCLOCATION': 'SCL3',
09:22:34 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:22:34 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:22:34 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:22:34 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:22:34 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:22:34 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:22:34 INFO - 'HOMEDRIVE': 'C:',
09:22:34 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:22:34 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:22:34 INFO - 'KTS_VERSION': '1.19c',
09:22:34 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:22:34 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-111',
09:22:34 INFO - 'MINIDUMP_SAVE_PATH': 'C:\\slave\\test\\build\\blobber_upload_dir',
09:22:34 INFO - 'MONDIR': 'C:\\Monitor_config\\',
09:22:34 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
09:22:34 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:22:34 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:22:34 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:22:34 INFO - 'MOZ_AIRBAG': '1',
09:22:34 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:22:34 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:22:34 INFO - 'MOZ_MSVCVERSION': '8',
09:22:34 INFO - 'MOZ_NO_REMOTE': '1',
09:22:34 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:22:34 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:22:34 INFO - 'NO_EM_RESTART': '1',
09:22:34 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:22:34 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:22:34 INFO - 'OS': 'Windows_NT',
09:22:34 INFO - 'OURDRIVE': 'C:',
09:22:34 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
09:22:34 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1',
09:22:34 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:22:34 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel',
09:22:34 INFO - 'PROCESSOR_LEVEL': '6',
09:22:34 INFO - 'PROCESSOR_REVISION': '1e05',
09:22:34 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:22:34 INFO - 'PROMPT': '$P$G',
09:22:34 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:22:34 INFO - 'PWD': 'C:\\slave\\test',
09:22:34 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
09:22:34 INFO - 'SESSIONNAME': 'Console',
09:22:34 INFO - 'SLAVEDIR': 'C:\\slave\\',
09:22:34 INFO - 'SYSTEMDRIVE': 'C:',
09:22:34 INFO - 'SYSTEMROOT': 'C:\\WINDOWS',
09:22:34 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:22:34 INFO - 'TEST1': 'testie',
09:22:34 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp',
09:22:34 INFO - 'USERDOMAIN': 'T-XP32-IX-111',
09:22:34 INFO - 'USERNAME': 'cltbld',
09:22:34 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-111',
09:22:34 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:22:34 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:22:34 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:22:34 INFO - 'WINDIR': 'C:\\WINDOWS',
09:22:34 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:22:34 INFO - Calling ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/W0yYBUTURaC8xKmjZG7Lpg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=C:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=9', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] with output_timeout 1000
09:22:35 INFO - STDERR: C:\slave\test\build\venv\lib\site-packages\mozrunner\utils.py:18: UserWarning: Module wptserve was already imported from C:\slave\test\build\tests\web-platform\tests\tools\wptserve\wptserve\__init__.py, but c:\slave\test\build\venv\lib\site-packages is being added to sys.path
09:22:35 INFO - import pkg_resources
09:22:35 INFO - STDERR: Opening manifest at C:\slave\test\build\tests\web-platform\meta\MANIFEST.json
09:22:36 INFO - STDERR: Opening manifest at C:\slave\test\build\tests\web-platform\mozilla\meta\MANIFEST.json
09:22:42 INFO - Using 1 client processes
09:22:45 INFO - SUITE-START | Running 828 tests
09:22:45 INFO - Running testharness tests
09:22:45 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker
09:22:45 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker | took 0ms
09:22:45 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html
09:22:45 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html | took 0ms
09:22:45 INFO - TEST-START | /XMLHttpRequest/send-redirect-post-upload.htm
09:22:45 INFO - TEST-SKIP | /XMLHttpRequest/send-redirect-post-upload.htm | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html | took 15ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html | took 0ms
09:22:45 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html
09:22:45 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html | took 0ms
09:22:45 INFO - TEST-START | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html
09:22:45 INFO - TEST-SKIP | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html | took 0ms
09:22:45 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html
09:22:45 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html | took 0ms
09:22:45 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html
09:22:45 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html | took 0ms
09:22:45 INFO - TEST-START | /html/semantics/embedded-content/media-elements/video_loop_base.html
09:22:45 INFO - TEST-SKIP | /html/semantics/embedded-content/media-elements/video_loop_base.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/area-navigate.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/area-navigate.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/fetch-messaging.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/fetch-messaging.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/iframe-messaging.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/iframe-messaging.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/image-decoding.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/image-decoding.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/link-navigate.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/link-navigate.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/script-messaging.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/script-messaging.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/worker-messaging.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/worker-messaging.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/generic/subresource-test/xhr-messaging.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/xhr-messaging.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html | took 0ms
09:22:45 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
09:22:45 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html | took 0ms
09:22:45 INFO - TEST-START | /service-workers/service-worker/appcache-ordering-main.https.html
09:22:45 INFO - TEST-SKIP | /service-workers/service-worker/appcache-ordering-main.https.html | took 0ms
09:22:45 INFO - TEST-START | /service-workers/service-worker/resource-timing.https.html
09:22:45 INFO - TEST-SKIP | /service-workers/service-worker/resource-timing.https.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html | took 0ms
09:22:45 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html
09:22:45 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html?wss
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html?wss | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html?wss
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html?wss | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html?wss
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html?wss | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html?wss
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html?wss | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html?wss
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html?wss | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html?wss
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html?wss | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html?wss
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html?wss | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html?wss
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html?wss | took 0ms
09:22:45 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html
09:22:45 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html | took 0ms
09:22:45 INFO - Setting up ssl
09:22:46 INFO - PROCESS | certutil |
09:22:46 INFO - PROCESS | certutil |
09:22:46 INFO - PROCESS | certutil |
09:22:46 INFO - Certificate Nickname Trust Attributes
09:22:46 INFO - SSL,S/MIME,JAR/XPI
09:22:46 INFO -
09:22:46 INFO - web-platform-tests CT,,
09:22:46 INFO -
09:22:46 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\docume~1\cltbld~1.t-x\locals~1\temp\tmph9ejym.mozrunner
09:22:46 INFO - Starting runner
09:22:48 INFO - PROCESS | 3712 | [3712] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/startupcache/StartupCache.cpp, line 219
09:22:48 INFO - PROCESS | 3712 | [3712] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
09:22:48 INFO - PROCESS | 3712 | [3712] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579
09:22:50 INFO - PROCESS | 3712 | 1477588970006 Marionette DEBUG Marionette enabled via build flag and pref
09:22:50 INFO - PROCESS | 3712 | ++DOCSHELL 122EA800 == 1 [pid = 3712] [id = 1]
09:22:50 INFO - PROCESS | 3712 | ++DOMWINDOW == 1 (122EAC00) [pid = 3712] [serial = 1] [outer = 00000000]
09:22:50 INFO - PROCESS | 3712 | ++DOMWINDOW == 2 (122EB800) [pid = 3712] [serial = 2] [outer = 122EAC00]
09:22:50 INFO - PROCESS | 3712 | [3712] WARNING: Dwm composition not available, falling back to software vsync: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 1964
09:22:50 INFO - PROCESS | 3712 | [3712] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpcom/io/nsDirectoryService.cpp, line 500
09:22:50 INFO - PROCESS | 3712 | [3712] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 794
09:22:50 INFO - PROCESS | 3712 | [3712] WARNING: Failed to determine sandbox temp dir path.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 867
09:22:50 INFO - PROCESS | 3712 | ++DOCSHELL 12225400 == 2 [pid = 3712] [id = 2]
09:22:50 INFO - PROCESS | 3712 | ++DOMWINDOW == 3 (12225800) [pid = 3712] [serial = 3] [outer = 00000000]
09:22:50 INFO - PROCESS | 3712 | ++DOMWINDOW == 4 (12226400) [pid = 3712] [serial = 4] [outer = 12225800]
09:22:50 INFO - PROCESS | 3712 | 1477588970659 Marionette INFO Listening on port 2828
09:22:51 INFO - PROCESS | 3712 | 1477588971107 Marionette DEBUG Marionette enabled via command-line flag
09:22:51 INFO - PROCESS | 3712 | ++DOCSHELL 1468F800 == 3 [pid = 3712] [id = 3]
09:22:51 INFO - PROCESS | 3712 | ++DOMWINDOW == 5 (1468FC00) [pid = 3712] [serial = 5] [outer = 00000000]
09:22:51 INFO - PROCESS | 3712 | ++DOMWINDOW == 6 (14690800) [pid = 3712] [serial = 6] [outer = 1468FC00]
09:22:51 INFO - PROCESS | 3712 | ++DOMWINDOW == 7 (14B36800) [pid = 3712] [serial = 7] [outer = 12225800]
09:22:51 INFO - PROCESS | 3712 | 1477588971455 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:1480
09:22:51 INFO - PROCESS | 3712 | 1477588971489 Marionette DEBUG Closed connection conn0
09:22:51 INFO - PROCESS | 3712 | 1477588971569 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:1482
09:22:51 INFO - PROCESS | 3712 | 1477588971620 Marionette DEBUG Closed connection conn1
09:22:51 INFO - PROCESS | 3712 | 1477588971628 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:1483
09:22:51 INFO - PROCESS | 3712 | ++DOCSHELL 14664C00 == 4 [pid = 3712] [id = 4]
09:22:51 INFO - PROCESS | 3712 | ++DOMWINDOW == 8 (15191800) [pid = 3712] [serial = 8] [outer = 00000000]
09:22:51 INFO - PROCESS | 3712 | ++DOMWINDOW == 9 (158F1C00) [pid = 3712] [serial = 9] [outer = 15191800]
09:22:51 INFO - PROCESS | 3712 | 1477588971760 Marionette DEBUG Closed connection conn2
09:22:51 INFO - PROCESS | 3712 | 1477588971766 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:1484
09:22:51 INFO - PROCESS | 3712 | ++DOMWINDOW == 10 (158FA400) [pid = 3712] [serial = 10] [outer = 15191800]
09:22:51 INFO - PROCESS | 3712 | 1477588971903 Marionette TRACE conn3 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
09:22:51 INFO - PROCESS | 3712 | 1477588971913 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027074934","processId":3712,"version":"52.0a1"}
09:22:52 INFO - PROCESS | 3712 | [3712] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:22:52 INFO - PROCESS | 3712 | [3712] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:22:52 INFO - PROCESS | 3712 | [3712] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
09:22:52 INFO - PROCESS | 3712 | [3712] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
09:22:52 INFO - PROCESS | 3712 | [3712] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:22:52 INFO - PROCESS | 3712 | ++DOCSHELL 17724000 == 5 [pid = 3712] [id = 5]
09:22:52 INFO - PROCESS | 3712 | ++DOMWINDOW == 11 (17724400) [pid = 3712] [serial = 11] [outer = 00000000]
09:22:52 INFO - PROCESS | 3712 | ++DOCSHELL 17724C00 == 6 [pid = 3712] [id = 6]
09:22:52 INFO - PROCESS | 3712 | ++DOMWINDOW == 12 (17725000) [pid = 3712] [serial = 12] [outer = 00000000]
09:22:53 INFO - PROCESS | 3712 | ++DOCSHELL 18614400 == 7 [pid = 3712] [id = 7]
09:22:53 INFO - PROCESS | 3712 | ++DOMWINDOW == 13 (18614800) [pid = 3712] [serial = 13] [outer = 00000000]
09:22:53 INFO - PROCESS | 3712 | ++DOMWINDOW == 14 (18927C00) [pid = 3712] [serial = 14] [outer = 18614800]
09:22:53 INFO - PROCESS | 3712 | ++DOMWINDOW == 15 (185C7400) [pid = 3712] [serial = 15] [outer = 17724400]
09:22:53 INFO - PROCESS | 3712 | ++DOMWINDOW == 16 (185C8400) [pid = 3712] [serial = 16] [outer = 17725000]
09:22:53 INFO - PROCESS | 3712 | ++DOMWINDOW == 17 (185CA000) [pid = 3712] [serial = 17] [outer = 18614800]
09:22:54 INFO - PROCESS | 3712 | 1477588974442 Marionette DEBUG loaded listener.js
09:22:55 INFO - PROCESS | 3712 | ++DOMWINDOW == 18 (0FF36800) [pid = 3712] [serial = 18] [outer = 18614800]
09:22:55 INFO - PROCESS | 3712 | 1477588975168 Marionette TRACE conn3 <- [1,1,null,{"sessionId":"9120bcd9-2af9-4148-a221-782f7e42ed56","capabilities":{"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027074934","processId":3712,"version":"52.0a1","command_id":1}}]
09:22:55 INFO - PROCESS | 3712 | 1477588975333 Marionette TRACE conn3 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":137}]
09:22:55 INFO - PROCESS | 3712 | 1477588975413 Marionette TRACE conn3 <- [1,2,null,{"value":null}]
09:22:55 INFO - PROCESS | 3712 | 1477588975493 Marionette TRACE conn3 -> [0,3,"getWindowHandle",null]
09:22:55 INFO - PROCESS | 3712 | 1477588975497 Marionette TRACE conn3 <- [1,3,null,{"value":"13"}]
09:22:55 INFO - PROCESS | 3712 | 1477588975593 Marionette TRACE conn3 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
09:22:55 INFO - PROCESS | 3712 | [3712] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
09:22:55 INFO - PROCESS | 3712 | ++DOMWINDOW == 19 (1A3B4800) [pid = 3712] [serial = 19] [outer = 18614800]
09:22:55 INFO - PROCESS | 3712 | 1477588975858 Marionette TRACE conn3 <- [1,4,null,{}]
09:22:55 INFO - PROCESS | 3712 | 1477588975850 Marionette TRACE conn3 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":150}]
09:22:55 INFO - PROCESS | 3712 | 1477588975875 Marionette TRACE conn3 <- [1,5,null,{"value":null}]
09:22:55 INFO - PROCESS | 3712 | 1477588975910 Marionette TRACE conn3 -> [0,6,"getWindowHandle",null]
09:22:55 INFO - PROCESS | 3712 | 1477588975916 Marionette TRACE conn3 <- [1,6,null,{"value":"13"}]
09:22:55 INFO - TEST-START | /2dcontext/image-smoothing/imagesmoothing.html
09:22:55 INFO - PROCESS | 3712 | 1477588975939 Marionette TRACE conn3 -> [0,7,"timeouts",{"script":35000}]
09:22:55 INFO - PROCESS | 3712 | 1477588975941 Marionette TRACE conn3 <- [1,7,null,{}]
09:22:55 INFO - PROCESS | 3712 | 1477588975965 Marionette TRACE conn3 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:22:55 INFO - PROCESS | 3712 | 1477588975992 Marionette TRACE conn3 <- [1,8,null,{"value":null}]
09:22:55 INFO - PROCESS | 3712 | 1477588975995 Marionette TRACE conn3 -> [0,9,"getWindowHandles",null]
09:22:55 INFO - PROCESS | 3712 | 1477588976000 Marionette TRACE conn3 <- [1,9,null,["13"]]
09:22:56 INFO - PROCESS | 3712 | 1477588976003 Marionette TRACE conn3 -> [0,10,"switchToWindow",{"name":"13"}]
09:22:56 INFO - PROCESS | 3712 | 1477588976008 Marionette TRACE conn3 <- [1,10,null,{}]
09:22:56 INFO - PROCESS | 3712 | 1477588976028 Marionette TRACE conn3 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/2dcontext/image-smoothing/imagesmoothing.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:22:56 INFO - PROCESS | 3712 | ++DOCSHELL 1ADA7C00 == 8 [pid = 3712] [id = 8]
09:22:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 20 (1ADA8000) [pid = 3712] [serial = 20] [outer = 00000000]
09:22:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 21 (1ADAB400) [pid = 3712] [serial = 21] [outer = 1ADA8000]
09:22:56 INFO - PROCESS | 3712 | 1477588976090 Marionette DEBUG loaded listener.js
09:22:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 22 (1ADAA400) [pid = 3712] [serial = 22] [outer = 1ADA8000]
09:22:56 INFO - PROCESS | 3712 | ++DOCSHELL 1B0F1C00 == 9 [pid = 3712] [id = 9]
09:22:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 23 (1B1AC400) [pid = 3712] [serial = 23] [outer = 00000000]
09:22:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 24 (1B1B9400) [pid = 3712] [serial = 24] [outer = 1B1AC400]
09:22:56 INFO - PROCESS | 3712 | 1477588976437 Marionette DEBUG loaded listener.js
09:22:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 25 (1B0F6800) [pid = 3712] [serial = 25] [outer = 1B1AC400]
09:22:56 INFO - PROCESS | 3712 | 1477588976822 Marionette TRACE conn3 <- [1,11,null,{"value":["/2dcontext/image-smoothing/imagesmoothing.html",0,null,null,[["When the canvas context is created, imageSmoothingEnabled must be set to true.",0,null,null],["On getting imageSmoothingEnabled, the user agent must return the last value it was set to.",0,null,null],["Test that image smoothing is actually on by default and just the attribute value.",0,null,null],["Test that image smoothing works when imageSmoothingEnabled is set to true",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with drawImage().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fillRect and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fill() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with stroke() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) still works after repaints.",0,null,null]]]}]
09:22:56 INFO - .........
09:22:56 INFO - TEST-OK | /2dcontext/image-smoothing/imagesmoothing.html | took 919ms
09:22:57 INFO - PROCESS | 3712 | 1477588977533 Marionette TRACE conn3 -> [0,12,"getWindowHandle",null]
09:22:57 INFO - PROCESS | 3712 | 1477588977536 Marionette TRACE conn3 <- [1,12,null,{"value":"13"}]
09:22:57 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker
09:22:57 INFO - PROCESS | 3712 | 1477588977570 Marionette TRACE conn3 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:22:57 INFO - PROCESS | 3712 | 1477588977701 Marionette TRACE conn3 <- [1,13,null,{"value":null}]
09:22:57 INFO - PROCESS | 3712 | 1477588977723 Marionette TRACE conn3 -> [0,14,"getWindowHandles",null]
09:22:57 INFO - PROCESS | 3712 | 1477588977725 Marionette TRACE conn3 <- [1,14,null,["13"]]
09:22:57 INFO - PROCESS | 3712 | 1477588977775 Marionette TRACE conn3 -> [0,15,"switchToWindow",{"name":"13"}]
09:22:57 INFO - PROCESS | 3712 | 1477588977779 Marionette TRACE conn3 <- [1,15,null,{}]
09:22:57 INFO - PROCESS | 3712 | 1477588977782 Marionette TRACE conn3 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:22:57 INFO - PROCESS | 3712 | ++DOCSHELL 1B9CDC00 == 10 [pid = 3712] [id = 10]
09:22:57 INFO - PROCESS | 3712 | ++DOMWINDOW == 26 (1B9CE000) [pid = 3712] [serial = 26] [outer = 00000000]
09:22:57 INFO - PROCESS | 3712 | ++DOMWINDOW == 27 (1C103800) [pid = 3712] [serial = 27] [outer = 1B9CE000]
09:22:57 INFO - PROCESS | 3712 | 1477588977839 Marionette DEBUG loaded listener.js
09:22:57 INFO - PROCESS | 3712 | ++DOMWINDOW == 28 (1C107800) [pid = 3712] [serial = 28] [outer = 1B9CE000]
09:22:58 INFO - PROCESS | 3712 | [3712] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:22:59 INFO - PROCESS | 3712 | ++DOCSHELL 1C1F8000 == 11 [pid = 3712] [id = 11]
09:22:59 INFO - PROCESS | 3712 | ++DOMWINDOW == 29 (1C1F8400) [pid = 3712] [serial = 29] [outer = 00000000]
09:22:59 INFO - PROCESS | 3712 | [3712] WARNING: No inner window available!: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/base/nsGlobalWindow.cpp, line 9723
09:22:59 INFO - PROCESS | 3712 | ++DOMWINDOW == 30 (01F52400) [pid = 3712] [serial = 30] [outer = 1C1F8400]
09:22:59 INFO - PROCESS | 3712 | ++DOMWINDOW == 31 (0F031800) [pid = 3712] [serial = 31] [outer = 1C1F8400]
09:23:00 INFO - PROCESS | 3712 | --DOCSHELL 122EA800 == 10 [pid = 3712] [id = 1]
09:23:00 INFO - PROCESS | 3712 | ++DOCSHELL 01F59800 == 11 [pid = 3712] [id = 12]
09:23:00 INFO - PROCESS | 3712 | ++DOMWINDOW == 32 (0F035C00) [pid = 3712] [serial = 32] [outer = 00000000]
09:23:00 INFO - PROCESS | 3712 | ++DOMWINDOW == 33 (0FA7E000) [pid = 3712] [serial = 33] [outer = 0F035C00]
09:23:00 INFO - PROCESS | 3712 | ++DOMWINDOW == 34 (0FD76800) [pid = 3712] [serial = 34] [outer = 0F035C00]
09:23:01 INFO - PROCESS | 3712 | --DOCSHELL 1ADA7C00 == 10 [pid = 3712] [id = 8]
09:23:01 INFO - PROCESS | 3712 | --DOCSHELL 14664C00 == 9 [pid = 3712] [id = 4]
09:23:08 INFO - PROCESS | 3712 | --DOMWINDOW == 33 (1ADA8000) [pid = 3712] [serial = 20] [outer = 00000000] [url = http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html]
09:23:08 INFO - PROCESS | 3712 | --DOMWINDOW == 32 (15191800) [pid = 3712] [serial = 8] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
09:23:08 INFO - PROCESS | 3712 | --DOMWINDOW == 31 (122EAC00) [pid = 3712] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanityparent.html]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 30 (1B1B9400) [pid = 3712] [serial = 24] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 29 (18927C00) [pid = 3712] [serial = 14] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 28 (158F1C00) [pid = 3712] [serial = 9] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 27 (158FA400) [pid = 3712] [serial = 10] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 26 (122EB800) [pid = 3712] [serial = 2] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 25 (12226400) [pid = 3712] [serial = 4] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 24 (185CA000) [pid = 3712] [serial = 17] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 23 (0FA7E000) [pid = 3712] [serial = 33] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 22 (1ADAA400) [pid = 3712] [serial = 22] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 21 (1ADAB400) [pid = 3712] [serial = 21] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 20 (1C103800) [pid = 3712] [serial = 27] [outer = 00000000] [url = about:blank]
09:23:13 INFO - PROCESS | 3712 | --DOMWINDOW == 19 (01F52400) [pid = 3712] [serial = 30] [outer = 00000000] [url = about:blank]
09:23:26 INFO - PROCESS | 3712 | MARIONETTE LOG: INFO: Timeout fired
09:23:26 INFO - PROCESS | 3712 | 1477589006900 Marionette TRACE conn3 <- [1,16,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker",2,null,null,[]]}]
09:23:26 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker | took 29339ms
09:23:26 INFO - PROCESS | 3712 | 1477589006927 Marionette TRACE conn3 -> [0,17,"getWindowHandle",null]
09:23:26 INFO - PROCESS | 3712 | 1477589006931 Marionette TRACE conn3 <- [1,17,null,{"value":"13"}]
09:23:26 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker
09:23:26 INFO - PROCESS | 3712 | 1477589006939 Marionette TRACE conn3 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:23:27 INFO - PROCESS | 3712 | 1477589007076 Marionette TRACE conn3 <- [1,18,null,{"value":null}]
09:23:27 INFO - PROCESS | 3712 | 1477589007110 Marionette TRACE conn3 -> [0,19,"getWindowHandles",null]
09:23:27 INFO - PROCESS | 3712 | 1477589007114 Marionette TRACE conn3 <- [1,19,null,["13"]]
09:23:27 INFO - PROCESS | 3712 | 1477589007120 Marionette TRACE conn3 -> [0,20,"switchToWindow",{"name":"13"}]
09:23:27 INFO - PROCESS | 3712 | 1477589007126 Marionette TRACE conn3 <- [1,20,null,{}]
09:23:27 INFO - PROCESS | 3712 | 1477589007130 Marionette TRACE conn3 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:23:27 INFO - PROCESS | 3712 | ++DOCSHELL 0FD6B400 == 10 [pid = 3712] [id = 13]
09:23:27 INFO - PROCESS | 3712 | ++DOMWINDOW == 20 (0FD6B800) [pid = 3712] [serial = 35] [outer = 00000000]
09:23:27 INFO - PROCESS | 3712 | ++DOMWINDOW == 21 (0FD6F800) [pid = 3712] [serial = 36] [outer = 0FD6B800]
09:23:27 INFO - PROCESS | 3712 | 1477589007211 Marionette DEBUG loaded listener.js
09:23:27 INFO - PROCESS | 3712 | ++DOMWINDOW == 22 (12220000) [pid = 3712] [serial = 37] [outer = 0FD6B800]
09:23:27 INFO - PROCESS | 3712 | [3712] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:23:29 INFO - PROCESS | 3712 | ++DOMWINDOW == 23 (12524400) [pid = 3712] [serial = 38] [outer = 0F035C00]
09:23:36 INFO - PROCESS | 3712 | --DOCSHELL 1B9CDC00 == 9 [pid = 3712] [id = 10]
09:23:38 INFO - PROCESS | 3712 | --DOMWINDOW == 22 (1B9CE000) [pid = 3712] [serial = 26] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker]
09:23:43 INFO - PROCESS | 3712 | --DOMWINDOW == 21 (1C107800) [pid = 3712] [serial = 28] [outer = 00000000] [url = about:blank]
09:23:43 INFO - PROCESS | 3712 | --DOMWINDOW == 20 (0FD6F800) [pid = 3712] [serial = 36] [outer = 00000000] [url = about:blank]
09:23:43 INFO - PROCESS | 3712 | --DOMWINDOW == 19 (0FD76800) [pid = 3712] [serial = 34] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:23:52 INFO - PROCESS | 3712 | 1477589032308 addons.productaddons WARN Failed downloading XML, status: 0, reason: error
09:23:56 INFO - PROCESS | 3712 | MARIONETTE LOG: INFO: Timeout fired
09:23:56 INFO - PROCESS | 3712 | 1477589036311 Marionette TRACE conn3 <- [1,21,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker",2,null,null,[]]}]
09:23:56 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker | took 29415ms
09:23:56 INFO - PROCESS | 3712 | 1477589036346 Marionette TRACE conn3 -> [0,22,"getWindowHandle",null]
09:23:56 INFO - PROCESS | 3712 | 1477589036349 Marionette TRACE conn3 <- [1,22,null,{"value":"13"}]
09:23:56 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/hkdf.worker
09:23:56 INFO - PROCESS | 3712 | 1477589036390 Marionette TRACE conn3 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:23:56 INFO - PROCESS | 3712 | 1477589036507 Marionette TRACE conn3 <- [1,23,null,{"value":null}]
09:23:56 INFO - PROCESS | 3712 | 1477589036514 Marionette TRACE conn3 -> [0,24,"getWindowHandles",null]
09:23:56 INFO - PROCESS | 3712 | 1477589036518 Marionette TRACE conn3 <- [1,24,null,["13"]]
09:23:56 INFO - PROCESS | 3712 | 1477589036523 Marionette TRACE conn3 -> [0,25,"switchToWindow",{"name":"13"}]
09:23:56 INFO - PROCESS | 3712 | 1477589036527 Marionette TRACE conn3 <- [1,25,null,{}]
09:23:56 INFO - PROCESS | 3712 | 1477589036534 Marionette TRACE conn3 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/hkdf.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:23:56 INFO - PROCESS | 3712 | ++DOCSHELL 13B57800 == 10 [pid = 3712] [id = 14]
09:23:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 20 (13BEBC00) [pid = 3712] [serial = 39] [outer = 00000000]
09:23:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 21 (13C45000) [pid = 3712] [serial = 40] [outer = 13BEBC00]
09:23:56 INFO - PROCESS | 3712 | 1477589036595 Marionette DEBUG loaded listener.js
09:23:56 INFO - PROCESS | 3712 | ++DOMWINDOW == 22 (13E4F000) [pid = 3712] [serial = 41] [outer = 13BEBC00]
09:23:56 INFO - PROCESS | 3712 | [3712] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:24:11 INFO - PROCESS | 3712 | 1477589049136 Marionette TRACE conn3 <- [1,26,null,{"value":["/WebCryptoAPI/derive_bits_keys/hkdf.worker",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"]]]}]
09:24:12 INFO - .................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
09:24:12 INFO - PROCESS | 3712 | --DOCSHELL 0FD6B400 == 9 [pid = 3712] [id = 13]
09:24:12 INFO - ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
09:24:12 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/hkdf.worker | took 16365ms
09:24:12 INFO - PROCESS | 3712 | 1477589052790 Marionette TRACE conn3 -> [0,27,"getWindowHandle",null]
09:24:12 INFO - PROCESS | 3712 | 1477589052794 Marionette TRACE conn3 <- [1,27,null,{"value":"13"}]
09:24:12 INFO - PROCESS | 3712 | 1477589052802 Marionette TRACE conn3 -> [0,28,"timeouts",{"script":185000}]
09:24:12 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html
09:24:12 INFO - PROCESS | 3712 | 1477589052807 Marionette TRACE conn3 <- [1,28,null,{}]
09:24:12 INFO - PROCESS | 3712 | 1477589052815 Marionette TRACE conn3 -> [0,29,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:24:12 INFO - PROCESS | 3712 | 1477589052921 Marionette TRACE conn3 <- [1,29,null,{"value":null}]
09:24:12 INFO - PROCESS | 3712 | 1477589052977 Marionette TRACE conn3 -> [0,30,"getWindowHandles",null]
09:24:12 INFO - PROCESS | 3712 | 1477589052985 Marionette TRACE conn3 <- [1,30,null,["13"]]
09:24:12 INFO - PROCESS | 3712 | 1477589052991 Marionette TRACE conn3 -> [0,31,"switchToWindow",{"name":"13"}]
09:24:13 INFO - PROCESS | 3712 | 1477589052996 Marionette TRACE conn3 <- [1,31,null,{}]
09:24:13 INFO - PROCESS | 3712 | 1477589053004 Marionette TRACE conn3 -> [0,32,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:24:13 INFO - PROCESS | 3712 | ++DOCSHELL 129E6C00 == 10 [pid = 3712] [id = 15]
09:24:13 INFO - PROCESS | 3712 | ++DOMWINDOW == 23 (129EC400) [pid = 3712] [serial = 42] [outer = 00000000]
09:24:13 INFO - PROCESS | 3712 | ++DOMWINDOW == 24 (13FEF000) [pid = 3712] [serial = 43] [outer = 129EC400]
09:24:13 INFO - PROCESS | 3712 | 1477589053071 Marionette DEBUG loaded listener.js
09:24:13 INFO - PROCESS | 3712 | ++DOMWINDOW == 25 (1441F000) [pid = 3712] [serial = 44] [outer = 129EC400]
09:24:14 INFO - PROCESS | 3712 | --DOMWINDOW == 24 (0FD6B800) [pid = 3712] [serial = 35] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker]
09:24:19 INFO - PROCESS | 3712 | --DOCSHELL 13B57800 == 9 [pid = 3712] [id = 14]
09:24:19 INFO - PROCESS | 3712 | --DOMWINDOW == 23 (13C45000) [pid = 3712] [serial = 40] [outer = 00000000] [url = about:blank]
09:24:19 INFO - PROCESS | 3712 | --DOMWINDOW == 22 (12220000) [pid = 3712] [serial = 37] [outer = 00000000] [url = about:blank]
09:24:21 INFO - PROCESS | 3712 | --DOMWINDOW == 21 (13BEBC00) [pid = 3712] [serial = 39] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker]
09:24:26 INFO - PROCESS | 3712 | --DOMWINDOW == 20 (13E4F000) [pid = 3712] [serial = 41] [outer = 00000000] [url = about:blank]
09:24:26 INFO - PROCESS | 3712 | --DOMWINDOW == 19 (13FEF000) [pid = 3712] [serial = 43] [outer = 00000000] [url = about:blank]
09:24:26 INFO - PROCESS | 3712 | ++DOMWINDOW == 20 (02F88400) [pid = 3712] [serial = 45] [outer = 0F035C00]
09:24:43 INFO - PROCESS | 3712 | --DOMWINDOW == 19 (12524400) [pid = 3712] [serial = 38] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:25:53 INFO - PROCESS | 3712 | ++DOMWINDOW == 20 (129EBC00) [pid = 3712] [serial = 46] [outer = 0F035C00]
09:26:11 INFO - PROCESS | 3712 | --DOMWINDOW == 19 (02F88400) [pid = 3712] [serial = 45] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:27:07 INFO - PROCESS | 3712 | MARIONETTE LOG: INFO: Timeout fired
09:27:07 INFO - PROCESS | 3712 | 1477589227054 Marionette TRACE conn3 <- [1,32,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html",2,null,null,[]]}]
09:27:07 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html | took 174277ms
09:27:07 INFO - PROCESS | 3712 | 1477589227082 Marionette TRACE conn3 -> [0,33,"getWindowHandle",null]
09:27:07 INFO - PROCESS | 3712 | 1477589227086 Marionette TRACE conn3 <- [1,33,null,{"value":"13"}]
09:27:07 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html
09:27:07 INFO - PROCESS | 3712 | 1477589227093 Marionette TRACE conn3 -> [0,34,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:27:07 INFO - PROCESS | 3712 | 1477589227225 Marionette TRACE conn3 <- [1,34,null,{"value":null}]
09:27:07 INFO - PROCESS | 3712 | 1477589227259 Marionette TRACE conn3 -> [0,35,"getWindowHandles",null]
09:27:07 INFO - PROCESS | 3712 | 1477589227263 Marionette TRACE conn3 <- [1,35,null,["13"]]
09:27:07 INFO - PROCESS | 3712 | 1477589227269 Marionette TRACE conn3 -> [0,36,"switchToWindow",{"name":"13"}]
09:27:07 INFO - PROCESS | 3712 | 1477589227274 Marionette TRACE conn3 <- [1,36,null,{}]
09:27:07 INFO - PROCESS | 3712 | 1477589227278 Marionette TRACE conn3 -> [0,37,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:27:07 INFO - PROCESS | 3712 | ++DOCSHELL 14530800 == 10 [pid = 3712] [id = 16]
09:27:07 INFO - PROCESS | 3712 | ++DOMWINDOW == 20 (14533400) [pid = 3712] [serial = 47] [outer = 00000000]
09:27:07 INFO - PROCESS | 3712 | ++DOMWINDOW == 21 (1459C800) [pid = 3712] [serial = 48] [outer = 14533400]
09:27:07 INFO - PROCESS | 3712 | 1477589227338 Marionette DEBUG loaded listener.js
09:27:07 INFO - PROCESS | 3712 | ++DOMWINDOW == 22 (1465E800) [pid = 3712] [serial = 49] [outer = 14533400]
09:27:11 INFO - PROCESS | 3712 | --DOCSHELL 129E6C00 == 9 [pid = 3712] [id = 15]
09:27:13 INFO - PROCESS | 3712 | --DOMWINDOW == 21 (129EC400) [pid = 3712] [serial = 42] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html]
09:27:18 INFO - PROCESS | 3712 | --DOMWINDOW == 20 (1459C800) [pid = 3712] [serial = 48] [outer = 00000000] [url = about:blank]
09:27:18 INFO - PROCESS | 3712 | --DOMWINDOW == 19 (1441F000) [pid = 3712] [serial = 44] [outer = 00000000] [url = about:blank]
09:27:50 INFO - PROCESS | 3712 | ++DOMWINDOW == 20 (122E5400) [pid = 3712] [serial = 50] [outer = 0F035C00]
09:28:10 INFO - PROCESS | 3712 | --DOMWINDOW == 19 (129EBC00) [pid = 3712] [serial = 46] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:30:05 INFO - PROCESS | 3712 | MARIONETTE LOG: INFO: Timeout fired
09:30:05 INFO - PROCESS | 3712 | 1477589405184 Marionette TRACE conn3 <- [1,37,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html",2,null,null,[]]}]
09:30:05 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html | took 178141ms
09:30:05 INFO - PROCESS | 3712 | 1477589405245 Marionette TRACE conn3 -> [0,38,"getWindowHandle",null]
09:30:05 INFO - PROCESS | 3712 | 1477589405250 Marionette TRACE conn3 <- [1,38,null,{"value":"13"}]
09:30:05 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_hkdf.html
09:30:05 INFO - PROCESS | 3712 | 1477589405289 Marionette TRACE conn3 -> [0,39,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:30:05 INFO - PROCESS | 3712 | 1477589405428 Marionette TRACE conn3 <- [1,39,null,{"value":null}]
09:30:05 INFO - PROCESS | 3712 | 1477589405462 Marionette TRACE conn3 -> [0,40,"getWindowHandles",null]
09:30:05 INFO - PROCESS | 3712 | 1477589405466 Marionette TRACE conn3 <- [1,40,null,["13"]]
09:30:05 INFO - PROCESS | 3712 | 1477589405471 Marionette TRACE conn3 -> [0,41,"switchToWindow",{"name":"13"}]
09:30:05 INFO - PROCESS | 3712 | 1477589405477 Marionette TRACE conn3 <- [1,41,null,{}]
09:30:05 INFO - PROCESS | 3712 | 1477589405483 Marionette TRACE conn3 -> [0,42,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_hkdf.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:30:05 INFO - PROCESS | 3712 | ++DOCSHELL 129E9C00 == 10 [pid = 3712] [id = 17]
09:30:05 INFO - PROCESS | 3712 | ++DOMWINDOW == 20 (129EA400) [pid = 3712] [serial = 51] [outer = 00000000]
09:30:05 INFO - PROCESS | 3712 | ++DOMWINDOW == 21 (13B59400) [pid = 3712] [serial = 52] [outer = 129EA400]
09:30:05 INFO - PROCESS | 3712 | 1477589405545 Marionette DEBUG loaded listener.js
09:30:05 INFO - PROCESS | 3712 | ++DOMWINDOW == 22 (13BF7000) [pid = 3712] [serial = 53] [outer = 129EA400]
09:30:17 INFO - PROCESS | 3712 | 1477589415555 Marionette TRACE conn3 <- [1,42,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_hkdf.html",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"]]]}]
09:30:18 INFO - .........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
09:30:18 INFO - PROCESS | 3712 | --DOCSHELL 14530800 == 9 [pid = 3712] [id = 16]
09:30:18 INFO - ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
09:30:18 INFO - PROCESS | 3712 | --DOCSHELL 1C1F8000 == 8 [pid = 3712] [id = 11]
09:30:19 INFO - ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
09:30:19 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/test_hkdf.html | took 13990ms
09:30:19 INFO - PROCESS | 3712 | 1477589419305 Marionette TRACE conn3 -> [0,43,"getWindowHandle",null]
09:30:19 INFO - PROCESS | 3712 | 1477589419297 Marionette TRACE conn3 <- [1,43,null,{"value":"13"}]
09:30:19 INFO - TEST-START | /XMLHttpRequest/FormData-append.html
09:30:19 INFO - PROCESS | 3712 | 1477589419305 Marionette TRACE conn3 -> [0,44,"timeouts",{"script":35000}]
09:30:19 INFO - PROCESS | 3712 | 1477589419310 Marionette TRACE conn3 <- [1,44,null,{}]
09:30:19 INFO - PROCESS | 3712 | 1477589419319 Marionette TRACE conn3 -> [0,45,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:30:19 INFO - PROCESS | 3712 | 1477589419446 Marionette TRACE conn3 <- [1,45,null,{"value":null}]
09:30:19 INFO - PROCESS | 3712 | 1477589419501 Marionette TRACE conn3 -> [0,46,"getWindowHandles",null]
09:30:19 INFO - PROCESS | 3712 | 1477589419509 Marionette TRACE conn3 <- [1,46,null,["13"]]
09:30:19 INFO - PROCESS | 3712 | 1477589419513 Marionette TRACE conn3 -> [0,47,"switchToWindow",{"name":"13"}]
09:30:19 INFO - PROCESS | 3712 | 1477589419519 Marionette TRACE conn3 <- [1,47,null,{}]
09:30:19 INFO - PROCESS | 3712 | 1477589419527 Marionette TRACE conn3 -> [0,48,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/FormData-append.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/FormData-append.html\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:30:19 INFO - PROCESS | 3712 | ++DOCSHELL 1443A800 == 9 [pid = 3712] [id = 18]
09:30:19 INFO - PROCESS | 3712 | ++DOMWINDOW == 23 (1443AC00) [pid = 3712] [serial = 54] [outer = 00000000]
09:30:19 INFO - PROCESS | 3712 | ++DOMWINDOW == 24 (171A1C00) [pid = 3712] [serial = 55] [outer = 1443AC00]
09:30:19 INFO - PROCESS | 3712 | 1477589419595 Marionette DEBUG loaded listener.js
09:30:19 INFO - PROCESS | 3712 | ++DOMWINDOW == 25 (17558400) [pid = 3712] [serial = 56] [outer = 1443AC00]
09:30:19 INFO - PROCESS | 3712 | 1477589419978 Marionette TRACE conn3 <- [1,48,null,{"value":["/XMLHttpRequest/FormData-append.html",0,null,null,[["Passing a String object to FormData.append should work.",0,null,null],["testFormDataAppend1",0,null,null],["testFormDataAppend2",0,null,null],["testFormDataAppendUndefined1",0,null,null],["testFormDataAppendUndefined2",0,null,null],["testFormDataAppendNull1",0,null,null],["testFormDataAppendNull2",0,null,null],["testFormDataAppendToForm1",0,null,null],["testFormDataAppendToForm2",0,null,null],["testFormDataAppendToFormUndefined1",0,null,null],["testFormDataAppendToFormUndefined2",0,null,null],["testFormDataAppendToFormNull1",0,null,null],["testFormDataAppendToFormNull2",0,null,null],["testFormDataAppendEmptyBlob",0,null,null]]]}]
09:30:20 INFO - ..............
09:30:20 INFO - TEST-OK | /XMLHttpRequest/FormData-append.html | took 679ms
09:30:20 INFO - PROCESS | 3712 | 1477589420010 Marionette TRACE conn3 -> [0,49,"getWindowHandle",null]
09:30:20 INFO - PROCESS | 3712 | 1477589420014 Marionette TRACE conn3 <- [1,49,null,{"value":"13"}]
09:30:20 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html
09:30:20 INFO - PROCESS | 3712 | 1477589420019 Marionette TRACE conn3 -> [0,50,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:30:20 INFO - PROCESS | 3712 | 1477589420155 Marionette TRACE conn3 <- [1,50,null,{"value":null}]
09:30:20 INFO - PROCESS | 3712 | 1477589420163 Marionette TRACE conn3 -> [0,51,"getWindowHandles",null]
09:30:20 INFO - PROCESS | 3712 | 1477589420167 Marionette TRACE conn3 <- [1,51,null,["13"]]
09:30:20 INFO - PROCESS | 3712 | 1477589420171 Marionette TRACE conn3 -> [0,52,"switchToWindow",{"name":"13"}]
09:30:20 INFO - PROCESS | 3712 | 1477589420175 Marionette TRACE conn3 <- [1,52,null,{}]
09:30:20 INFO - PROCESS | 3712 | 1477589420186 Marionette TRACE conn3 -> [0,53,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:30:20 INFO - PROCESS | 3712 | ++DOCSHELL 17F94000 == 10 [pid = 3712] [id = 19]
09:30:20 INFO - PROCESS | 3712 | ++DOMWINDOW == 26 (17F94C00) [pid = 3712] [serial = 57] [outer = 00000000]
09:30:20 INFO - PROCESS | 3712 | ++DOMWINDOW == 27 (18426C00) [pid = 3712] [serial = 58] [outer = 17F94C00]
09:30:20 INFO - PROCESS | 3712 | 1477589420247 Marionette DEBUG loaded listener.js
09:30:20 INFO - PROCESS | 3712 | ++DOMWINDOW == 28 (1842CC00) [pid = 3712] [serial = 59] [outer = 17F94C00]
09:30:20 INFO - PROCESS | 3712 | [3712] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:30:20 INFO - PROCESS | 3712 | --DOMWINDOW == 27 (14533400) [pid = 3712] [serial = 47] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html]
09:30:21 INFO - PROCESS | 3712 | 1477589421616 Marionette TRACE conn3 <- [1,53,null,{"value":["/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html",0,null,null,[["default value is false, set value is true",0,null,null],["can also be set in OPEN state",0,null,null],["setting on synchronous XHR",0,null,null],["setting withCredentials when not in UNSENT, OPENED state (asynchronous)",0,null,null],["setting withCredentials when in DONE state (synchronous)",0,null,null]]]}]
09:30:21 INFO - .....
09:30:21 INFO - TEST-OK | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html | took 1620ms
09:30:21 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker
09:30:21 INFO - PROCESS | 3712 | 1477589421649 Marionette TRACE conn3 -> [0,54,"getWindowHandle",null]
09:30:21 INFO - PROCESS | 3712 | 1477589421652 Marionette TRACE conn3 <- [1,54,null,{"value":"13"}]
09:30:21 INFO - PROCESS | 3712 | 1477589421656 Marionette TRACE conn3 -> [0,55,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:30:21 INFO - PROCESS | 3712 | 1477589421762 Marionette TRACE conn3 <- [1,55,null,{"value":null}]
09:30:21 INFO - PROCESS | 3712 | 1477589421817 Marionette TRACE conn3 -> [0,56,"getWindowHandles",null]
09:30:21 INFO - PROCESS | 3712 | 1477589421821 Marionette TRACE conn3 <- [1,56,null,["13"]]
09:30:21 INFO - PROCESS | 3712 | 1477589421825 Marionette TRACE conn3 -> [0,57,"switchToWindow",{"name":"13"}]
09:30:21 INFO - PROCESS | 3712 | 1477589421830 Marionette TRACE conn3 <- [1,57,null,{}]
09:30:21 INFO - PROCESS | 3712 | 1477589421834 Marionette TRACE conn3 -> [0,58,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\", \"5005353f-5587-4770-a86a-2bfd80a7dacc\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:30:21 INFO - PROCESS | 3712 | ++DOCSHELL 186DD400 == 11 [pid = 3712] [id = 20]
09:30:21 INFO - PROCESS | 3712 | ++DOMWINDOW == 28 (186DD800) [pid = 3712] [serial = 60] [outer = 00000000]
09:30:21 INFO - PROCESS | 3712 | ++DOMWINDOW == 29 (186E4400) [pid = 3712] [serial = 61] [outer = 186DD800]
09:30:21 INFO - PROCESS | 3712 | 1477589421897 Marionette DEBUG loaded listener.js
09:30:21 INFO - PROCESS | 3712 | ++DOMWINDOW == 30 (18926C00) [pid = 3712] [serial = 62] [outer = 186DD800]
09:30:22 INFO - PROCESS | 3712 | [3712] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:30:26 INFO - PROCESS | 3712 | --DOCSHELL 17F94000 == 10 [pid = 3712] [id = 19]
09:30:26 INFO - PROCESS | 3712 | --DOCSHELL 1443A800 == 9 [pid = 3712] [id = 18]
09:30:26 INFO - PROCESS | 3712 | --DOCSHELL 129E9C00 == 8 [pid = 3712] [id = 17]
09:30:26 INFO - PROCESS | 3712 | --DOCSHELL 01F59800 == 7 [pid = 3712] [id = 12]
09:30:26 INFO - PROCESS | 3712 | --DOMWINDOW == 29 (1465E800) [pid = 3712] [serial = 49] [outer = 00000000] [url = about:blank]
09:30:26 INFO - PROCESS | 3712 | --DOMWINDOW == 28 (13B59400) [pid = 3712] [serial = 52] [outer = 00000000] [url = about:blank]
09:30:29 INFO - PROCESS | 3712 | --DOMWINDOW == 27 (129EA400) [pid = 3712] [serial = 51] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html]
09:30:29 INFO - PROCESS | 3712 | --DOMWINDOW == 26 (1443AC00) [pid = 3712] [serial = 54] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/FormData-append.html]
09:30:29 INFO - PROCESS | 3712 | --DOMWINDOW == 25 (17F94C00) [pid = 3712] [serial = 57] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html]
09:30:29 INFO - PROCESS | 3712 | --DOMWINDOW == 24 (0F035C00) [pid = 3712] [serial = 32] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:30:29 INFO - PROCESS | 3712 | --DOMWINDOW == 23 (1C1F8400) [pid = 3712] [serial = 29] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
09:30:33 INFO - PROCESS | 3712 | --DOMWINDOW == 22 (13BF7000) [pid = 3712] [serial = 53] [outer = 00000000] [url = about:blank]
09:30:33 INFO - PROCESS | 3712 | --DOMWINDOW == 21 (186E4400) [pid = 3712] [serial = 61] [outer = 00000000] [url = about:blank]
09:30:33 INFO - PROCESS | 3712 | --DOMWINDOW == 20 (18426C00) [pid = 3712] [serial = 58] [outer = 00000000] [url = about:blank]
09:30:33 INFO - PROCESS | 3712 | --DOMWINDOW == 19 (1842CC00) [pid = 3712] [serial = 59] [outer = 00000000] [url = about:blank]
09:30:33 INFO - PROCESS | 3712 | --DOMWINDOW == 18 (0F031800) [pid = 3712] [serial = 31] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
09:30:33 INFO - PROCESS | 3712 | --DOMWINDOW == 17 (171A1C00) [pid = 3712] [serial = 55] [outer = 00000000] [url = about:blank]
09:30:33 INFO - PROCESS | 3712 | --DOMWINDOW == 16 (17558400) [pid = 3712] [serial = 56] [outer = 00000000] [url = about:blank]
09:30:33 INFO - PROCESS | 3712 | --DOMWINDOW == 15 (122E5400) [pid = 3712] [serial = 50] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:30:51 INFO - PROCESS | 3712 | MARIONETTE LOG: INFO: Timeout fired
09:30:51 INFO - PROCESS | 3712 | JavaScript error: executormarionette.py, line 33: TypeError: window.wrappedJSObject.win.timeout is not a function
09:30:56 INFO - PROCESS | 3712 | 1477589456402 Marionette TRACE conn3 <- [1,58,{"error":"script timeout","message":"Timed out","stacktrace":""},null]
09:30:56 INFO - TEST-TIMEOUT | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker | took 34798ms
09:30:56 WARNING - u'runner_teardown' ()
09:30:56 INFO - Setting up ssl
09:30:56 INFO - PROCESS | certutil |
09:30:56 INFO - PROCESS | certutil |
09:30:56 INFO - PROCESS | certutil |
09:30:56 INFO - Certificate Nickname Trust Attributes
09:30:56 INFO - SSL,S/MIME,JAR/XPI
09:30:56 INFO -
09:30:56 INFO - web-platform-tests CT,,
09:30:56 INFO -
09:30:56 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\docume~1\cltbld~1.t-x\locals~1\temp\tmpva3pjt.mozrunner
09:30:56 INFO - Starting runner
09:30:57 INFO - PROCESS | 1504 | [1504] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/startupcache/StartupCache.cpp, line 219
09:30:57 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
09:30:57 INFO - PROCESS | 1504 | [1504] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579
09:30:58 INFO - PROCESS | 1504 | 1477589458898 Marionette DEBUG Marionette enabled via build flag and pref
09:30:58 INFO - PROCESS | 1504 | ++DOCSHELL 0F0F2800 == 1 [pid = 1504] [id = 1]
09:30:58 INFO - PROCESS | 1504 | ++DOMWINDOW == 1 (0F0F2C00) [pid = 1504] [serial = 1] [outer = 00000000]
09:30:58 INFO - PROCESS | 1504 | ++DOMWINDOW == 2 (0F0F3800) [pid = 1504] [serial = 2] [outer = 0F0F2C00]
09:30:59 INFO - PROCESS | 1504 | [1504] WARNING: Dwm composition not available, falling back to software vsync: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 1964
09:30:59 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpcom/io/nsDirectoryService.cpp, line 500
09:30:59 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 794
09:30:59 INFO - PROCESS | 1504 | [1504] WARNING: Failed to determine sandbox temp dir path.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 867
09:30:59 INFO - PROCESS | 1504 | ++DOCSHELL 123C9400 == 2 [pid = 1504] [id = 2]
09:30:59 INFO - PROCESS | 1504 | ++DOMWINDOW == 3 (123C9800) [pid = 1504] [serial = 3] [outer = 00000000]
09:30:59 INFO - PROCESS | 1504 | ++DOMWINDOW == 4 (123CA400) [pid = 1504] [serial = 4] [outer = 123C9800]
09:30:59 INFO - PROCESS | 1504 | 1477589459474 Marionette INFO Listening on port 2829
09:30:59 INFO - PROCESS | 1504 | 1477589459924 Marionette DEBUG Marionette enabled via command-line flag
09:30:59 INFO - PROCESS | 1504 | ++DOCSHELL 14590C00 == 3 [pid = 1504] [id = 3]
09:30:59 INFO - PROCESS | 1504 | ++DOMWINDOW == 5 (14591000) [pid = 1504] [serial = 5] [outer = 00000000]
09:30:59 INFO - PROCESS | 1504 | ++DOMWINDOW == 6 (14591C00) [pid = 1504] [serial = 6] [outer = 14591000]
09:31:00 INFO - PROCESS | 1504 | ++DOMWINDOW == 7 (1484A800) [pid = 1504] [serial = 7] [outer = 123C9800]
09:31:00 INFO - PROCESS | 1504 | 1477589460183 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:1818
09:31:00 INFO - PROCESS | 1504 | 1477589460217 Marionette DEBUG Closed connection conn0
09:31:00 INFO - PROCESS | 1504 | 1477589460282 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:1819
09:31:00 INFO - PROCESS | 1504 | 1477589460334 Marionette DEBUG Closed connection conn1
09:31:00 INFO - PROCESS | 1504 | 1477589460341 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:1820
09:31:00 INFO - PROCESS | 1504 | 1477589460348 Marionette DEBUG Closed connection conn2
09:31:00 INFO - PROCESS | 1504 | ++DOCSHELL 14562C00 == 4 [pid = 1504] [id = 4]
09:31:00 INFO - PROCESS | 1504 | ++DOMWINDOW == 8 (151A9000) [pid = 1504] [serial = 8] [outer = 00000000]
09:31:00 INFO - PROCESS | 1504 | ++DOMWINDOW == 9 (157F0400) [pid = 1504] [serial = 9] [outer = 151A9000]
09:31:00 INFO - PROCESS | 1504 | 1477589460483 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:1821
09:31:00 INFO - PROCESS | 1504 | ++DOMWINDOW == 10 (157F8800) [pid = 1504] [serial = 10] [outer = 151A9000]
09:31:00 INFO - PROCESS | 1504 | 1477589460567 Marionette TRACE conn3 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
09:31:00 INFO - PROCESS | 1504 | 1477589460575 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027074934","processId":1504,"version":"52.0a1"}
09:31:00 INFO - PROCESS | 1504 | [1504] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:31:00 INFO - PROCESS | 1504 | [1504] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:31:00 INFO - PROCESS | 1504 | [1504] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
09:31:00 INFO - PROCESS | 1504 | [1504] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
09:31:00 INFO - PROCESS | 1504 | [1504] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:31:01 INFO - PROCESS | 1504 | ++DOCSHELL 157F0800 == 5 [pid = 1504] [id = 5]
09:31:01 INFO - PROCESS | 1504 | ++DOMWINDOW == 11 (17838800) [pid = 1504] [serial = 11] [outer = 00000000]
09:31:01 INFO - PROCESS | 1504 | ++DOCSHELL 1783C800 == 6 [pid = 1504] [id = 6]
09:31:01 INFO - PROCESS | 1504 | ++DOMWINDOW == 12 (1783D000) [pid = 1504] [serial = 12] [outer = 00000000]
09:31:02 INFO - PROCESS | 1504 | ++DOCSHELL 1850FC00 == 7 [pid = 1504] [id = 7]
09:31:02 INFO - PROCESS | 1504 | ++DOMWINDOW == 13 (18510000) [pid = 1504] [serial = 13] [outer = 00000000]
09:31:02 INFO - PROCESS | 1504 | ++DOMWINDOW == 14 (18871400) [pid = 1504] [serial = 14] [outer = 18510000]
09:31:02 INFO - PROCESS | 1504 | ++DOMWINDOW == 15 (1856A000) [pid = 1504] [serial = 15] [outer = 17838800]
09:31:02 INFO - PROCESS | 1504 | ++DOMWINDOW == 16 (1856B000) [pid = 1504] [serial = 16] [outer = 1783D000]
09:31:02 INFO - PROCESS | 1504 | ++DOMWINDOW == 17 (1856CC00) [pid = 1504] [serial = 17] [outer = 18510000]
09:31:03 INFO - PROCESS | 1504 | 1477589463009 Marionette DEBUG loaded listener.js
09:31:03 INFO - PROCESS | 1504 | ++DOMWINDOW == 18 (0FF36C00) [pid = 1504] [serial = 18] [outer = 18510000]
09:31:03 INFO - PROCESS | 1504 | 1477589463711 Marionette TRACE conn3 <- [1,1,null,{"sessionId":"ff7574f6-e661-4ad7-ab50-99d9b43cd93a","capabilities":{"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027074934","processId":1504,"version":"52.0a1","command_id":1}}]
09:31:03 INFO - PROCESS | 1504 | 1477589463832 Marionette TRACE conn3 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":137}]
09:31:03 INFO - PROCESS | 1504 | 1477589463927 Marionette TRACE conn3 <- [1,2,null,{"value":null}]
09:31:03 INFO - PROCESS | 1504 | 1477589463977 Marionette TRACE conn3 -> [0,3,"getWindowHandle",null]
09:31:03 INFO - PROCESS | 1504 | 1477589463981 Marionette TRACE conn3 <- [1,3,null,{"value":"13"}]
09:31:04 INFO - PROCESS | 1504 | 1477589464114 Marionette TRACE conn3 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
09:31:04 INFO - PROCESS | 1504 | [1504] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
09:31:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 19 (1A725C00) [pid = 1504] [serial = 19] [outer = 18510000]
09:31:04 INFO - PROCESS | 1504 | 1477589464365 Marionette TRACE conn3 <- [1,4,null,{}]
09:31:04 INFO - PROCESS | 1504 | 1477589464375 Marionette TRACE conn3 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":150}]
09:31:04 INFO - PROCESS | 1504 | 1477589464400 Marionette TRACE conn3 <- [1,5,null,{"value":null}]
09:31:04 INFO - PROCESS | 1504 | 1477589464439 Marionette TRACE conn3 -> [0,6,"getWindowHandle",null]
09:31:04 INFO - PROCESS | 1504 | 1477589464444 Marionette TRACE conn3 <- [1,6,null,{"value":"13"}]
09:31:04 INFO - TEST-START | /XMLHttpRequest/abort-after-receive.htm
09:31:04 INFO - PROCESS | 1504 | 1477589464459 Marionette TRACE conn3 -> [0,7,"timeouts",{"script":35000}]
09:31:04 INFO - PROCESS | 1504 | 1477589464461 Marionette TRACE conn3 <- [1,7,null,{}]
09:31:04 INFO - PROCESS | 1504 | 1477589464473 Marionette TRACE conn3 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:04 INFO - PROCESS | 1504 | 1477589464500 Marionette TRACE conn3 <- [1,8,null,{"value":null}]
09:31:04 INFO - PROCESS | 1504 | 1477589464509 Marionette TRACE conn3 -> [0,9,"getWindowHandles",null]
09:31:04 INFO - PROCESS | 1504 | 1477589464513 Marionette TRACE conn3 <- [1,9,null,["13"]]
09:31:04 INFO - PROCESS | 1504 | 1477589464528 Marionette TRACE conn3 -> [0,10,"switchToWindow",{"name":"13"}]
09:31:04 INFO - PROCESS | 1504 | 1477589464531 Marionette TRACE conn3 <- [1,10,null,{}]
09:31:04 INFO - PROCESS | 1504 | 1477589464551 Marionette TRACE conn3 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-receive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:04 INFO - PROCESS | 1504 | ++DOCSHELL 1AD08800 == 8 [pid = 1504] [id = 8]
09:31:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 20 (1AD08C00) [pid = 1504] [serial = 20] [outer = 00000000]
09:31:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 21 (1AD0C000) [pid = 1504] [serial = 21] [outer = 1AD08C00]
09:31:04 INFO - PROCESS | 1504 | 1477589464618 Marionette DEBUG loaded listener.js
09:31:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 22 (1AD0B000) [pid = 1504] [serial = 22] [outer = 1AD08C00]
09:31:04 INFO - PROCESS | 1504 | ++DOCSHELL 1ADBCC00 == 9 [pid = 1504] [id = 9]
09:31:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 23 (1ADBD000) [pid = 1504] [serial = 23] [outer = 00000000]
09:31:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 24 (1B0C9000) [pid = 1504] [serial = 24] [outer = 1ADBD000]
09:31:04 INFO - PROCESS | 1504 | 1477589464986 Marionette DEBUG loaded listener.js
09:31:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 25 (1B174C00) [pid = 1504] [serial = 25] [outer = 1ADBD000]
09:31:05 INFO - PROCESS | 1504 | 1477589465530 Marionette TRACE conn3 <- [1,11,null,{"value":["/XMLHttpRequest/abort-after-receive.htm",0,null,null,[["XMLHttpRequest: abort() after successful receive should not fire \"abort\" event",0,null,null]]]}]
09:31:05 INFO - .
09:31:05 INFO - TEST-OK | /XMLHttpRequest/abort-after-receive.htm | took 1080ms
09:31:05 INFO - PROCESS | 1504 | 1477589465551 Marionette TRACE conn3 -> [0,12,"getWindowHandle",null]
09:31:05 INFO - PROCESS | 1504 | 1477589465553 Marionette TRACE conn3 <- [1,12,null,{"value":"13"}]
09:31:05 INFO - TEST-START | /XMLHttpRequest/abort-after-send.htm
09:31:05 INFO - PROCESS | 1504 | 1477589465557 Marionette TRACE conn3 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:05 INFO - PROCESS | 1504 | 1477589465668 Marionette TRACE conn3 <- [1,13,null,{"value":null}]
09:31:05 INFO - PROCESS | 1504 | 1477589465674 Marionette TRACE conn3 -> [0,14,"getWindowHandles",null]
09:31:05 INFO - PROCESS | 1504 | 1477589465676 Marionette TRACE conn3 <- [1,14,null,["13"]]
09:31:05 INFO - PROCESS | 1504 | 1477589465680 Marionette TRACE conn3 -> [0,15,"switchToWindow",{"name":"13"}]
09:31:05 INFO - PROCESS | 1504 | 1477589465684 Marionette TRACE conn3 <- [1,15,null,{}]
09:31:05 INFO - PROCESS | 1504 | 1477589465688 Marionette TRACE conn3 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:05 INFO - PROCESS | 1504 | ++DOCSHELL 151AD800 == 10 [pid = 1504] [id = 10]
09:31:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 26 (157F3800) [pid = 1504] [serial = 26] [outer = 00000000]
09:31:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 27 (1A728C00) [pid = 1504] [serial = 27] [outer = 157F3800]
09:31:05 INFO - PROCESS | 1504 | 1477589465746 Marionette DEBUG loaded listener.js
09:31:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 28 (1B376000) [pid = 1504] [serial = 28] [outer = 157F3800]
09:31:06 INFO - PROCESS | 1504 | 1477589466128 Marionette TRACE conn3 <- [1,16,null,{"value":["/XMLHttpRequest/abort-after-send.htm",0,null,null,[["XMLHttpRequest: abort() after send()",0,null,null]]]}]
09:31:06 INFO - .
09:31:06 INFO - TEST-OK | /XMLHttpRequest/abort-after-send.htm | took 617ms
09:31:06 INFO - PROCESS | 1504 | 1477589466176 Marionette TRACE conn3 -> [0,17,"getWindowHandle",null]
09:31:06 INFO - PROCESS | 1504 | 1477589466178 Marionette TRACE conn3 <- [1,17,null,{"value":"13"}]
09:31:06 INFO - TEST-START | /XMLHttpRequest/abort-after-stop.htm
09:31:06 INFO - PROCESS | 1504 | 1477589466183 Marionette TRACE conn3 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:06 INFO - PROCESS | 1504 | 1477589466296 Marionette TRACE conn3 <- [1,18,null,{"value":null}]
09:31:06 INFO - PROCESS | 1504 | 1477589466301 Marionette TRACE conn3 -> [0,19,"getWindowHandles",null]
09:31:06 INFO - PROCESS | 1504 | 1477589466304 Marionette TRACE conn3 <- [1,19,null,["13"]]
09:31:06 INFO - PROCESS | 1504 | 1477589466307 Marionette TRACE conn3 -> [0,20,"switchToWindow",{"name":"13"}]
09:31:06 INFO - PROCESS | 1504 | 1477589466311 Marionette TRACE conn3 <- [1,20,null,{}]
09:31:06 INFO - PROCESS | 1504 | 1477589466316 Marionette TRACE conn3 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-stop.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:06 INFO - PROCESS | 1504 | ++DOCSHELL 16A0B800 == 11 [pid = 1504] [id = 11]
09:31:06 INFO - PROCESS | 1504 | ++DOMWINDOW == 29 (16A0BC00) [pid = 1504] [serial = 29] [outer = 00000000]
09:31:06 INFO - PROCESS | 1504 | ++DOMWINDOW == 30 (16A0F000) [pid = 1504] [serial = 30] [outer = 16A0BC00]
09:31:06 INFO - PROCESS | 1504 | 1477589466377 Marionette DEBUG loaded listener.js
09:31:06 INFO - PROCESS | 1504 | ++DOMWINDOW == 31 (16A15400) [pid = 1504] [serial = 31] [outer = 16A0BC00]
09:31:08 INFO - PROCESS | 1504 | ++DOCSHELL 1BB1FC00 == 12 [pid = 1504] [id = 12]
09:31:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 32 (1BB20000) [pid = 1504] [serial = 32] [outer = 00000000]
09:31:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 33 (1BB20800) [pid = 1504] [serial = 33] [outer = 1BB20000]
09:31:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 34 (1BD43C00) [pid = 1504] [serial = 34] [outer = 1BB20000]
09:31:08 INFO - PROCESS | 1504 | ++DOCSHELL 1BD3B800 == 13 [pid = 1504] [id = 13]
09:31:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 35 (1BD44800) [pid = 1504] [serial = 35] [outer = 00000000]
09:31:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 36 (1BD49800) [pid = 1504] [serial = 36] [outer = 1BD44800]
09:31:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 37 (1BE63800) [pid = 1504] [serial = 37] [outer = 1BD44800]
09:31:09 INFO - PROCESS | 1504 | --DOCSHELL 0F0F2800 == 12 [pid = 1504] [id = 1]
09:31:10 INFO - PROCESS | 1504 | --DOCSHELL 151AD800 == 11 [pid = 1504] [id = 10]
09:31:10 INFO - PROCESS | 1504 | --DOCSHELL 1AD08800 == 10 [pid = 1504] [id = 8]
09:31:10 INFO - PROCESS | 1504 | --DOCSHELL 14562C00 == 9 [pid = 1504] [id = 4]
09:31:17 INFO - PROCESS | 1504 | --DOMWINDOW == 36 (151A9000) [pid = 1504] [serial = 8] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
09:31:17 INFO - PROCESS | 1504 | --DOMWINDOW == 35 (0F0F2C00) [pid = 1504] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanityparent.html]
09:31:17 INFO - PROCESS | 1504 | --DOMWINDOW == 34 (157F3800) [pid = 1504] [serial = 26] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm]
09:31:17 INFO - PROCESS | 1504 | --DOMWINDOW == 33 (1AD08C00) [pid = 1504] [serial = 20] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 32 (1BD49800) [pid = 1504] [serial = 36] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 31 (1B0C9000) [pid = 1504] [serial = 24] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 30 (18871400) [pid = 1504] [serial = 14] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 29 (157F0400) [pid = 1504] [serial = 9] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 28 (157F8800) [pid = 1504] [serial = 10] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 27 (1BB20800) [pid = 1504] [serial = 33] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 26 (1AD0B000) [pid = 1504] [serial = 22] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 25 (1AD0C000) [pid = 1504] [serial = 21] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 24 (1B376000) [pid = 1504] [serial = 28] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 23 (1A728C00) [pid = 1504] [serial = 27] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 22 (16A0F000) [pid = 1504] [serial = 30] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 21 (0F0F3800) [pid = 1504] [serial = 2] [outer = 00000000] [url = about:blank]
09:31:22 INFO - PROCESS | 1504 | --DOMWINDOW == 20 (123CA400) [pid = 1504] [serial = 4] [outer = 00000000] [url = about:blank]
09:31:27 INFO - PROCESS | 1504 | --DOMWINDOW == 19 (1856CC00) [pid = 1504] [serial = 17] [outer = 00000000] [url = about:blank]
09:31:36 INFO - PROCESS | 1504 | MARIONETTE LOG: INFO: Timeout fired
09:31:36 INFO - PROCESS | 1504 | 1477589496130 Marionette TRACE conn3 <- [1,21,null,{"value":["/XMLHttpRequest/abort-after-stop.htm",2,null,null,[["XMLHttpRequest: abort event should fire when stop() method is used",1,"assert_equals: expected true but got false","@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:24:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:23:11\nsetTimeout handler*@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:22:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:13:7\n"]]]}]
09:31:36 INFO - .
09:31:36 INFO - TEST-TIMEOUT | /XMLHttpRequest/abort-after-stop.htm | took 30002ms
09:31:36 INFO - PROCESS | 1504 | 1477589496180 Marionette TRACE conn3 -> [0,22,"getWindowHandle",null]
09:31:36 INFO - PROCESS | 1504 | 1477589496184 Marionette TRACE conn3 <- [1,22,null,{"value":"13"}]
09:31:36 INFO - TEST-START | /XMLHttpRequest/abort-after-timeout.htm
09:31:36 INFO - PROCESS | 1504 | 1477589496192 Marionette TRACE conn3 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:36 INFO - PROCESS | 1504 | 1477589496327 Marionette TRACE conn3 <- [1,23,null,{"value":null}]
09:31:36 INFO - PROCESS | 1504 | 1477589496360 Marionette TRACE conn3 -> [0,24,"getWindowHandles",null]
09:31:36 INFO - PROCESS | 1504 | 1477589496363 Marionette TRACE conn3 <- [1,24,null,["13"]]
09:31:36 INFO - PROCESS | 1504 | 1477589496369 Marionette TRACE conn3 -> [0,25,"switchToWindow",{"name":"13"}]
09:31:36 INFO - PROCESS | 1504 | 1477589496375 Marionette TRACE conn3 <- [1,25,null,{}]
09:31:36 INFO - PROCESS | 1504 | 1477589496380 Marionette TRACE conn3 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:36 INFO - PROCESS | 1504 | ++DOCSHELL 0FA8C400 == 10 [pid = 1504] [id = 14]
09:31:36 INFO - PROCESS | 1504 | ++DOMWINDOW == 20 (0FA8C800) [pid = 1504] [serial = 38] [outer = 00000000]
09:31:36 INFO - PROCESS | 1504 | ++DOMWINDOW == 21 (0FD73400) [pid = 1504] [serial = 39] [outer = 0FA8C800]
09:31:36 INFO - PROCESS | 1504 | 1477589496459 Marionette DEBUG loaded listener.js
09:31:36 INFO - PROCESS | 1504 | ++DOMWINDOW == 22 (0FD78800) [pid = 1504] [serial = 40] [outer = 0FA8C800]
09:31:37 INFO - PROCESS | 1504 | 1477589497065 Marionette TRACE conn3 <- [1,26,null,{"value":["/XMLHttpRequest/abort-after-timeout.htm",0,null,null,[["XMLHttpRequest: abort() after a timeout should not fire \"abort\" event",0,null,null]]]}]
09:31:37 INFO - .
09:31:37 INFO - TEST-OK | /XMLHttpRequest/abort-after-timeout.htm | took 926ms
09:31:37 INFO - PROCESS | 1504 | 1477589497136 Marionette TRACE conn3 -> [0,27,"getWindowHandle",null]
09:31:37 INFO - PROCESS | 1504 | 1477589497139 Marionette TRACE conn3 <- [1,27,null,{"value":"13"}]
09:31:37 INFO - TEST-START | /XMLHttpRequest/abort-during-done.htm
09:31:37 INFO - PROCESS | 1504 | 1477589497145 Marionette TRACE conn3 -> [0,28,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:37 INFO - PROCESS | 1504 | 1477589497255 Marionette TRACE conn3 <- [1,28,null,{"value":null}]
09:31:37 INFO - PROCESS | 1504 | 1477589497261 Marionette TRACE conn3 -> [0,29,"getWindowHandles",null]
09:31:37 INFO - PROCESS | 1504 | 1477589497265 Marionette TRACE conn3 <- [1,29,null,["13"]]
09:31:37 INFO - PROCESS | 1504 | 1477589497269 Marionette TRACE conn3 -> [0,30,"switchToWindow",{"name":"13"}]
09:31:37 INFO - PROCESS | 1504 | 1477589497273 Marionette TRACE conn3 <- [1,30,null,{}]
09:31:37 INFO - PROCESS | 1504 | 1477589497277 Marionette TRACE conn3 -> [0,31,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-done.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:37 INFO - PROCESS | 1504 | ++DOCSHELL 0FF0E400 == 11 [pid = 1504] [id = 15]
09:31:37 INFO - PROCESS | 1504 | ++DOMWINDOW == 23 (0FF56800) [pid = 1504] [serial = 41] [outer = 00000000]
09:31:37 INFO - PROCESS | 1504 | ++DOMWINDOW == 24 (12201C00) [pid = 1504] [serial = 42] [outer = 0FF56800]
09:31:37 INFO - PROCESS | 1504 | 1477589497334 Marionette DEBUG loaded listener.js
09:31:37 INFO - PROCESS | 1504 | ++DOMWINDOW == 25 (123BE400) [pid = 1504] [serial = 43] [outer = 0FF56800]
09:31:37 INFO - PROCESS | 1504 | 1477589497700 Marionette TRACE conn3 <- [1,31,null,{"value":["/XMLHttpRequest/abort-during-done.htm",0,null,null,[["XMLHttpRequest: abort() during DONE",0,null,null]]]}]
09:31:37 INFO - .
09:31:37 INFO - TEST-OK | /XMLHttpRequest/abort-during-done.htm | took 632ms
09:31:37 INFO - PROCESS | 1504 | 1477589497773 Marionette TRACE conn3 -> [0,32,"getWindowHandle",null]
09:31:37 INFO - PROCESS | 1504 | 1477589497778 Marionette TRACE conn3 <- [1,32,null,{"value":"13"}]
09:31:37 INFO - PROCESS | 1504 | 1477589497783 Marionette TRACE conn3 -> [0,33,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:37 INFO - TEST-START | /XMLHttpRequest/abort-during-open.htm
09:31:37 INFO - PROCESS | 1504 | 1477589497913 Marionette TRACE conn3 <- [1,33,null,{"value":null}]
09:31:37 INFO - PROCESS | 1504 | 1477589497949 Marionette TRACE conn3 -> [0,34,"getWindowHandles",null]
09:31:37 INFO - PROCESS | 1504 | 1477589497952 Marionette TRACE conn3 <- [1,34,null,["13"]]
09:31:37 INFO - PROCESS | 1504 | 1477589497956 Marionette TRACE conn3 -> [0,35,"switchToWindow",{"name":"13"}]
09:31:37 INFO - PROCESS | 1504 | 1477589497961 Marionette TRACE conn3 <- [1,35,null,{}]
09:31:37 INFO - PROCESS | 1504 | 1477589497964 Marionette TRACE conn3 -> [0,36,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:37 INFO - PROCESS | 1504 | ++DOCSHELL 128AE800 == 12 [pid = 1504] [id = 16]
09:31:37 INFO - PROCESS | 1504 | ++DOMWINDOW == 26 (128AF000) [pid = 1504] [serial = 44] [outer = 00000000]
09:31:38 INFO - PROCESS | 1504 | ++DOMWINDOW == 27 (12A92400) [pid = 1504] [serial = 45] [outer = 128AF000]
09:31:38 INFO - PROCESS | 1504 | 1477589498031 Marionette DEBUG loaded listener.js
09:31:38 INFO - PROCESS | 1504 | ++DOMWINDOW == 28 (13BEEC00) [pid = 1504] [serial = 46] [outer = 128AF000]
09:31:38 INFO - PROCESS | 1504 | ++DOMWINDOW == 29 (13FED000) [pid = 1504] [serial = 47] [outer = 1BD44800]
09:31:38 INFO - PROCESS | 1504 | 1477589498454 Marionette TRACE conn3 <- [1,36,null,{"value":["/XMLHttpRequest/abort-during-open.htm",0,null,null,[["XMLHttpRequest: abort() during OPEN",0,null,null]]]}]
09:31:38 INFO - .
09:31:38 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.htm | took 663ms
09:31:38 INFO - PROCESS | 1504 | 1477589498464 Marionette TRACE conn3 -> [0,37,"getWindowHandle",null]
09:31:38 INFO - PROCESS | 1504 | 1477589498467 Marionette TRACE conn3 <- [1,37,null,{"value":"13"}]
09:31:38 INFO - TEST-START | /XMLHttpRequest/abort-during-open.worker
09:31:38 INFO - PROCESS | 1504 | 1477589498471 Marionette TRACE conn3 -> [0,38,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:38 INFO - PROCESS | 1504 | 1477589498571 Marionette TRACE conn3 <- [1,38,null,{"value":null}]
09:31:38 INFO - PROCESS | 1504 | 1477589498577 Marionette TRACE conn3 -> [0,39,"getWindowHandles",null]
09:31:38 INFO - PROCESS | 1504 | 1477589498579 Marionette TRACE conn3 <- [1,39,null,["13"]]
09:31:38 INFO - PROCESS | 1504 | 1477589498584 Marionette TRACE conn3 -> [0,40,"switchToWindow",{"name":"13"}]
09:31:38 INFO - PROCESS | 1504 | 1477589498589 Marionette TRACE conn3 <- [1,40,null,{}]
09:31:38 INFO - PROCESS | 1504 | 1477589498592 Marionette TRACE conn3 -> [0,41,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:38 INFO - PROCESS | 1504 | ++DOCSHELL 13E3C800 == 13 [pid = 1504] [id = 17]
09:31:38 INFO - PROCESS | 1504 | ++DOMWINDOW == 30 (1443E800) [pid = 1504] [serial = 48] [outer = 00000000]
09:31:38 INFO - PROCESS | 1504 | ++DOMWINDOW == 31 (1449F400) [pid = 1504] [serial = 49] [outer = 1443E800]
09:31:38 INFO - PROCESS | 1504 | 1477589498646 Marionette DEBUG loaded listener.js
09:31:38 INFO - PROCESS | 1504 | ++DOMWINDOW == 32 (1455D400) [pid = 1504] [serial = 50] [outer = 1443E800]
09:31:38 INFO - PROCESS | 1504 | [1504] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:31:39 INFO - PROCESS | 1504 | 1477589499067 Marionette TRACE conn3 <- [1,41,null,{"value":["/XMLHttpRequest/abort-during-open.worker",0,null,null,[["Untitled",0,{},{}]]]}]
09:31:39 INFO - .
09:31:39 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.worker | took 616ms
09:31:39 INFO - PROCESS | 1504 | 1477589499090 Marionette TRACE conn3 -> [0,42,"getWindowHandle",null]
09:31:39 INFO - PROCESS | 1504 | 1477589499092 Marionette TRACE conn3 <- [1,42,null,{"value":"13"}]
09:31:39 INFO - TEST-START | /XMLHttpRequest/abort-during-unsent.htm
09:31:39 INFO - PROCESS | 1504 | 1477589499102 Marionette TRACE conn3 -> [0,43,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:39 INFO - PROCESS | 1504 | 1477589499216 Marionette TRACE conn3 <- [1,43,null,{"value":null}]
09:31:39 INFO - PROCESS | 1504 | 1477589499223 Marionette TRACE conn3 -> [0,44,"getWindowHandles",null]
09:31:39 INFO - PROCESS | 1504 | 1477589499225 Marionette TRACE conn3 <- [1,44,null,["13"]]
09:31:39 INFO - PROCESS | 1504 | 1477589499228 Marionette TRACE conn3 -> [0,45,"switchToWindow",{"name":"13"}]
09:31:39 INFO - PROCESS | 1504 | 1477589499232 Marionette TRACE conn3 <- [1,45,null,{}]
09:31:39 INFO - PROCESS | 1504 | 1477589499237 Marionette TRACE conn3 -> [0,46,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-unsent.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:39 INFO - PROCESS | 1504 | ++DOCSHELL 14841800 == 14 [pid = 1504] [id = 18]
09:31:39 INFO - PROCESS | 1504 | ++DOMWINDOW == 33 (14848C00) [pid = 1504] [serial = 51] [outer = 00000000]
09:31:39 INFO - PROCESS | 1504 | ++DOMWINDOW == 34 (151B3800) [pid = 1504] [serial = 52] [outer = 14848C00]
09:31:39 INFO - PROCESS | 1504 | 1477589499291 Marionette DEBUG loaded listener.js
09:31:39 INFO - PROCESS | 1504 | ++DOMWINDOW == 35 (151B4C00) [pid = 1504] [serial = 53] [outer = 14848C00]
09:31:39 INFO - PROCESS | 1504 | 1477589499619 Marionette TRACE conn3 <- [1,46,null,{"value":["/XMLHttpRequest/abort-during-unsent.htm",0,null,null,[["XMLHttpRequest: abort() during UNSENT",0,null,null]]]}]
09:31:39 INFO - .
09:31:39 INFO - TEST-OK | /XMLHttpRequest/abort-during-unsent.htm | took 586ms
09:31:39 INFO - PROCESS | 1504 | 1477589499693 Marionette TRACE conn3 -> [0,47,"getWindowHandle",null]
09:31:39 INFO - PROCESS | 1504 | 1477589499695 Marionette TRACE conn3 <- [1,47,null,{"value":"13"}]
09:31:39 INFO - TEST-START | /XMLHttpRequest/abort-during-upload.htm
09:31:39 INFO - PROCESS | 1504 | 1477589499699 Marionette TRACE conn3 -> [0,48,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:39 INFO - PROCESS | 1504 | 1477589499852 Marionette TRACE conn3 <- [1,48,null,{"value":null}]
09:31:39 INFO - PROCESS | 1504 | 1477589499859 Marionette TRACE conn3 -> [0,49,"getWindowHandles",null]
09:31:39 INFO - PROCESS | 1504 | 1477589499862 Marionette TRACE conn3 <- [1,49,null,["13"]]
09:31:39 INFO - PROCESS | 1504 | 1477589499866 Marionette TRACE conn3 -> [0,50,"switchToWindow",{"name":"13"}]
09:31:39 INFO - PROCESS | 1504 | 1477589499869 Marionette TRACE conn3 <- [1,50,null,{}]
09:31:39 INFO - PROCESS | 1504 | 1477589499873 Marionette TRACE conn3 -> [0,51,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-upload.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:39 INFO - PROCESS | 1504 | ++DOCSHELL 157FAC00 == 15 [pid = 1504] [id = 19]
09:31:39 INFO - PROCESS | 1504 | ++DOMWINDOW == 36 (16A0A000) [pid = 1504] [serial = 54] [outer = 00000000]
09:31:39 INFO - PROCESS | 1504 | ++DOMWINDOW == 37 (16B66000) [pid = 1504] [serial = 55] [outer = 16A0A000]
09:31:39 INFO - PROCESS | 1504 | 1477589499927 Marionette DEBUG loaded listener.js
09:31:39 INFO - PROCESS | 1504 | ++DOMWINDOW == 38 (16B70C00) [pid = 1504] [serial = 56] [outer = 16A0A000]
09:31:40 INFO - PROCESS | 1504 | 1477589500263 Marionette TRACE conn3 <- [1,51,null,{"value":["/XMLHttpRequest/abort-during-upload.htm",0,null,null,[["XMLHttpRequest: abort() while sending data",0,null,null]]]}]
09:31:40 INFO - .
09:31:40 INFO - TEST-OK | /XMLHttpRequest/abort-during-upload.htm | took 632ms
09:31:40 INFO - PROCESS | 1504 | 1477589500319 Marionette TRACE conn3 -> [0,52,"getWindowHandle",null]
09:31:40 INFO - PROCESS | 1504 | 1477589500322 Marionette TRACE conn3 <- [1,52,null,{"value":"13"}]
09:31:40 INFO - TEST-START | /XMLHttpRequest/abort-event-abort.htm
09:31:40 INFO - PROCESS | 1504 | 1477589500326 Marionette TRACE conn3 -> [0,53,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:40 INFO - PROCESS | 1504 | 1477589500437 Marionette TRACE conn3 <- [1,53,null,{"value":null}]
09:31:40 INFO - PROCESS | 1504 | 1477589500444 Marionette TRACE conn3 -> [0,54,"getWindowHandles",null]
09:31:40 INFO - PROCESS | 1504 | 1477589500447 Marionette TRACE conn3 <- [1,54,null,["13"]]
09:31:40 INFO - PROCESS | 1504 | 1477589500451 Marionette TRACE conn3 -> [0,55,"switchToWindow",{"name":"13"}]
09:31:40 INFO - PROCESS | 1504 | 1477589500454 Marionette TRACE conn3 <- [1,55,null,{}]
09:31:40 INFO - PROCESS | 1504 | 1477589500458 Marionette TRACE conn3 -> [0,56,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:40 INFO - PROCESS | 1504 | ++DOCSHELL 16D36000 == 16 [pid = 1504] [id = 20]
09:31:40 INFO - PROCESS | 1504 | ++DOMWINDOW == 39 (16D36800) [pid = 1504] [serial = 57] [outer = 00000000]
09:31:40 INFO - PROCESS | 1504 | ++DOMWINDOW == 40 (17197800) [pid = 1504] [serial = 58] [outer = 16D36800]
09:31:40 INFO - PROCESS | 1504 | 1477589500511 Marionette DEBUG loaded listener.js
09:31:40 INFO - PROCESS | 1504 | ++DOMWINDOW == 41 (17504C00) [pid = 1504] [serial = 59] [outer = 16D36800]
09:31:40 INFO - PROCESS | 1504 | 1477589500827 Marionette TRACE conn3 <- [1,56,null,{"value":["/XMLHttpRequest/abort-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: do not fire abort event in OPENED state when send() flag is unset. send() throws after abort().",0,null,null]]]}]
09:31:40 INFO - .
09:31:40 INFO - TEST-OK | /XMLHttpRequest/abort-event-abort.htm | took 524ms
09:31:40 INFO - PROCESS | 1504 | 1477589500860 Marionette TRACE conn3 -> [0,57,"getWindowHandle",null]
09:31:40 INFO - PROCESS | 1504 | 1477589500862 Marionette TRACE conn3 <- [1,57,null,{"value":"13"}]
09:31:40 INFO - TEST-START | /XMLHttpRequest/abort-event-listeners.htm
09:31:40 INFO - PROCESS | 1504 | 1477589500867 Marionette TRACE conn3 -> [0,58,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:40 INFO - PROCESS | 1504 | 1477589500952 Marionette TRACE conn3 <- [1,58,null,{"value":null}]
09:31:40 INFO - PROCESS | 1504 | 1477589500957 Marionette TRACE conn3 -> [0,59,"getWindowHandles",null]
09:31:40 INFO - PROCESS | 1504 | 1477589500960 Marionette TRACE conn3 <- [1,59,null,["13"]]
09:31:40 INFO - PROCESS | 1504 | 1477589500964 Marionette TRACE conn3 -> [0,60,"switchToWindow",{"name":"13"}]
09:31:40 INFO - PROCESS | 1504 | 1477589500968 Marionette TRACE conn3 <- [1,60,null,{}]
09:31:40 INFO - PROCESS | 1504 | 1477589500971 Marionette TRACE conn3 -> [0,61,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-listeners.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:40 INFO - PROCESS | 1504 | ++DOCSHELL 17802C00 == 17 [pid = 1504] [id = 21]
09:31:40 INFO - PROCESS | 1504 | ++DOMWINDOW == 42 (17807800) [pid = 1504] [serial = 60] [outer = 00000000]
09:31:40 INFO - PROCESS | 1504 | ++DOMWINDOW == 43 (17837400) [pid = 1504] [serial = 61] [outer = 17807800]
09:31:41 INFO - PROCESS | 1504 | 1477589501025 Marionette DEBUG loaded listener.js
09:31:41 INFO - PROCESS | 1504 | ++DOMWINDOW == 44 (17840000) [pid = 1504] [serial = 62] [outer = 17807800]
09:31:41 INFO - PROCESS | 1504 | 1477589501351 Marionette TRACE conn3 <- [1,61,null,{"value":["/XMLHttpRequest/abort-event-listeners.htm",0,null,null,[["XMLHttpRequest: abort() should not reset event listeners",0,null,null]]]}]
09:31:41 INFO - .
09:31:41 INFO - TEST-OK | /XMLHttpRequest/abort-event-listeners.htm | took 525ms
09:31:41 INFO - PROCESS | 1504 | 1477589501384 Marionette TRACE conn3 -> [0,62,"getWindowHandle",null]
09:31:41 INFO - PROCESS | 1504 | 1477589501387 Marionette TRACE conn3 <- [1,62,null,{"value":"13"}]
09:31:41 INFO - TEST-START | /XMLHttpRequest/abort-event-loadend.htm
09:31:41 INFO - PROCESS | 1504 | 1477589501391 Marionette TRACE conn3 -> [0,63,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:41 INFO - PROCESS | 1504 | 1477589501505 Marionette TRACE conn3 <- [1,63,null,{"value":null}]
09:31:41 INFO - PROCESS | 1504 | 1477589501540 Marionette TRACE conn3 -> [0,64,"getWindowHandles",null]
09:31:41 INFO - PROCESS | 1504 | 1477589501544 Marionette TRACE conn3 <- [1,64,null,["13"]]
09:31:41 INFO - PROCESS | 1504 | 1477589501548 Marionette TRACE conn3 -> [0,65,"switchToWindow",{"name":"13"}]
09:31:41 INFO - PROCESS | 1504 | 1477589501551 Marionette TRACE conn3 <- [1,65,null,{}]
09:31:41 INFO - PROCESS | 1504 | 1477589501555 Marionette TRACE conn3 -> [0,66,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:41 INFO - PROCESS | 1504 | ++DOCSHELL 17A2FC00 == 18 [pid = 1504] [id = 22]
09:31:41 INFO - PROCESS | 1504 | ++DOMWINDOW == 45 (17A32800) [pid = 1504] [serial = 63] [outer = 00000000]
09:31:41 INFO - PROCESS | 1504 | ++DOMWINDOW == 46 (17A75000) [pid = 1504] [serial = 64] [outer = 17A32800]
09:31:41 INFO - PROCESS | 1504 | 1477589501610 Marionette DEBUG loaded listener.js
09:31:41 INFO - PROCESS | 1504 | ++DOMWINDOW == 47 (18566000) [pid = 1504] [serial = 65] [outer = 17A32800]
09:31:41 INFO - PROCESS | 1504 | 1477589501898 Marionette TRACE conn3 <- [1,66,null,{"value":["/XMLHttpRequest/abort-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend",0,null,null]]]}]
09:31:41 INFO - .
09:31:41 INFO - TEST-OK | /XMLHttpRequest/abort-event-loadend.htm | took 525ms
09:31:41 INFO - PROCESS | 1504 | 1477589501926 Marionette TRACE conn3 -> [0,67,"getWindowHandle",null]
09:31:41 INFO - PROCESS | 1504 | 1477589501928 Marionette TRACE conn3 <- [1,67,null,{"value":"13"}]
09:31:41 INFO - TEST-START | /XMLHttpRequest/abort-event-order.htm
09:31:41 INFO - PROCESS | 1504 | 1477589501932 Marionette TRACE conn3 -> [0,68,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:42 INFO - PROCESS | 1504 | 1477589502019 Marionette TRACE conn3 <- [1,68,null,{"value":null}]
09:31:42 INFO - PROCESS | 1504 | 1477589502023 Marionette TRACE conn3 -> [0,69,"getWindowHandles",null]
09:31:42 INFO - PROCESS | 1504 | 1477589502026 Marionette TRACE conn3 <- [1,69,null,["13"]]
09:31:42 INFO - PROCESS | 1504 | 1477589502029 Marionette TRACE conn3 -> [0,70,"switchToWindow",{"name":"13"}]
09:31:42 INFO - PROCESS | 1504 | 1477589502032 Marionette TRACE conn3 <- [1,70,null,{}]
09:31:42 INFO - PROCESS | 1504 | 1477589502038 Marionette TRACE conn3 -> [0,71,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:42 INFO - PROCESS | 1504 | ++DOCSHELL 17A2E400 == 19 [pid = 1504] [id = 23]
09:31:42 INFO - PROCESS | 1504 | ++DOMWINDOW == 48 (17A34C00) [pid = 1504] [serial = 66] [outer = 00000000]
09:31:42 INFO - PROCESS | 1504 | ++DOMWINDOW == 49 (18DED400) [pid = 1504] [serial = 67] [outer = 17A34C00]
09:31:42 INFO - PROCESS | 1504 | 1477589502097 Marionette DEBUG loaded listener.js
09:31:42 INFO - PROCESS | 1504 | ++DOMWINDOW == 50 (18C9A400) [pid = 1504] [serial = 68] [outer = 17A34C00]
09:31:42 INFO - PROCESS | 1504 | 1477589502449 Marionette TRACE conn3 <- [1,71,null,{"value":["/XMLHttpRequest/abort-event-order.htm",0,null,null,[["XMLHttpRequest: The abort() method: abort and loadend events",0,null,null]]]}]
09:31:42 INFO - .
09:31:42 INFO - TEST-OK | /XMLHttpRequest/abort-event-order.htm | took 540ms
09:31:42 INFO - PROCESS | 1504 | 1477589502466 Marionette TRACE conn3 -> [0,72,"getWindowHandle",null]
09:31:42 INFO - PROCESS | 1504 | 1477589502469 Marionette TRACE conn3 <- [1,72,null,{"value":"13"}]
09:31:42 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-abort.htm
09:31:42 INFO - PROCESS | 1504 | 1477589502473 Marionette TRACE conn3 -> [0,73,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:42 INFO - PROCESS | 1504 | 1477589502587 Marionette TRACE conn3 <- [1,73,null,{"value":null}]
09:31:42 INFO - PROCESS | 1504 | 1477589502594 Marionette TRACE conn3 -> [0,74,"getWindowHandles",null]
09:31:42 INFO - PROCESS | 1504 | 1477589502596 Marionette TRACE conn3 <- [1,74,null,["13"]]
09:31:42 INFO - PROCESS | 1504 | 1477589502600 Marionette TRACE conn3 -> [0,75,"switchToWindow",{"name":"13"}]
09:31:42 INFO - PROCESS | 1504 | 1477589502604 Marionette TRACE conn3 <- [1,75,null,{}]
09:31:42 INFO - PROCESS | 1504 | 1477589502607 Marionette TRACE conn3 -> [0,76,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:42 INFO - PROCESS | 1504 | ++DOCSHELL 19190800 == 20 [pid = 1504] [id = 24]
09:31:42 INFO - PROCESS | 1504 | ++DOMWINDOW == 51 (192CB400) [pid = 1504] [serial = 69] [outer = 00000000]
09:31:42 INFO - PROCESS | 1504 | ++DOMWINDOW == 52 (192D2400) [pid = 1504] [serial = 70] [outer = 192CB400]
09:31:42 INFO - PROCESS | 1504 | 1477589502670 Marionette DEBUG loaded listener.js
09:31:42 INFO - PROCESS | 1504 | ++DOMWINDOW == 53 (194B9400) [pid = 1504] [serial = 71] [outer = 192CB400]
09:31:43 INFO - PROCESS | 1504 | 1477589503024 Marionette TRACE conn3 <- [1,76,null,{"value":["/XMLHttpRequest/abort-upload-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named abort on the XMLHttpRequestUpload object",0,null,null]]]}]
09:31:43 INFO - .
09:31:43 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-abort.htm | took 586ms
09:31:43 INFO - PROCESS | 1504 | 1477589503052 Marionette TRACE conn3 -> [0,77,"getWindowHandle",null]
09:31:43 INFO - PROCESS | 1504 | 1477589503054 Marionette TRACE conn3 <- [1,77,null,{"value":"13"}]
09:31:43 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-loadend.htm
09:31:43 INFO - PROCESS | 1504 | 1477589503059 Marionette TRACE conn3 -> [0,78,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:43 INFO - PROCESS | 1504 | 1477589503171 Marionette TRACE conn3 <- [1,78,null,{"value":null}]
09:31:43 INFO - PROCESS | 1504 | 1477589503176 Marionette TRACE conn3 -> [0,79,"getWindowHandles",null]
09:31:43 INFO - PROCESS | 1504 | 1477589503178 Marionette TRACE conn3 <- [1,79,null,["13"]]
09:31:43 INFO - PROCESS | 1504 | 1477589503182 Marionette TRACE conn3 -> [0,80,"switchToWindow",{"name":"13"}]
09:31:43 INFO - PROCESS | 1504 | 1477589503185 Marionette TRACE conn3 <- [1,80,null,{}]
09:31:43 INFO - PROCESS | 1504 | 1477589503188 Marionette TRACE conn3 -> [0,81,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:43 INFO - PROCESS | 1504 | ++DOCSHELL 1976B400 == 21 [pid = 1504] [id = 25]
09:31:43 INFO - PROCESS | 1504 | ++DOMWINDOW == 54 (1976C800) [pid = 1504] [serial = 72] [outer = 00000000]
09:31:43 INFO - PROCESS | 1504 | ++DOMWINDOW == 55 (199F5800) [pid = 1504] [serial = 73] [outer = 1976C800]
09:31:43 INFO - PROCESS | 1504 | 1477589503243 Marionette DEBUG loaded listener.js
09:31:43 INFO - PROCESS | 1504 | ++DOMWINDOW == 56 (199F4000) [pid = 1504] [serial = 74] [outer = 1976C800]
09:31:43 INFO - PROCESS | 1504 | 1477589503582 Marionette TRACE conn3 <- [1,81,null,{"value":["/XMLHttpRequest/abort-upload-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend on the XMLHttpRequestUpload object",0,null,null]]]}]
09:31:43 INFO - .
09:31:43 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-loadend.htm | took 555ms
09:31:43 INFO - PROCESS | 1504 | 1477589503634 Marionette TRACE conn3 -> [0,82,"getWindowHandle",null]
09:31:43 INFO - PROCESS | 1504 | 1477589503636 Marionette TRACE conn3 <- [1,82,null,{"value":"13"}]
09:31:43 INFO - TEST-START | /XMLHttpRequest/anonymous-mode-unsupported.htm
09:31:43 INFO - PROCESS | 1504 | 1477589503640 Marionette TRACE conn3 -> [0,83,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:43 INFO - PROCESS | 1504 | 1477589503729 Marionette TRACE conn3 <- [1,83,null,{"value":null}]
09:31:43 INFO - PROCESS | 1504 | 1477589503734 Marionette TRACE conn3 -> [0,84,"getWindowHandles",null]
09:31:43 INFO - PROCESS | 1504 | 1477589503736 Marionette TRACE conn3 <- [1,84,null,["13"]]
09:31:43 INFO - PROCESS | 1504 | 1477589503795 Marionette TRACE conn3 -> [0,85,"switchToWindow",{"name":"13"}]
09:31:43 INFO - PROCESS | 1504 | 1477589503799 Marionette TRACE conn3 <- [1,85,null,{}]
09:31:43 INFO - PROCESS | 1504 | 1477589503802 Marionette TRACE conn3 -> [0,86,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/anonymous-mode-unsupported.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:43 INFO - PROCESS | 1504 | ++DOCSHELL 18A29000 == 22 [pid = 1504] [id = 26]
09:31:43 INFO - PROCESS | 1504 | ++DOMWINDOW == 57 (192CF800) [pid = 1504] [serial = 75] [outer = 00000000]
09:31:43 INFO - PROCESS | 1504 | ++DOMWINDOW == 58 (19D37C00) [pid = 1504] [serial = 76] [outer = 192CF800]
09:31:43 INFO - PROCESS | 1504 | 1477589503855 Marionette DEBUG loaded listener.js
09:31:43 INFO - PROCESS | 1504 | ++DOMWINDOW == 59 (1A575C00) [pid = 1504] [serial = 77] [outer = 192CF800]
09:31:44 INFO - PROCESS | 1504 | 1477589504137 Marionette TRACE conn3 <- [1,86,null,{"value":["/XMLHttpRequest/anonymous-mode-unsupported.htm",0,null,null,[["XMLHttpRequest: anonymous mode unsupported",0,null,null]]]}]
09:31:44 INFO - .
09:31:44 INFO - TEST-OK | /XMLHttpRequest/anonymous-mode-unsupported.htm | took 524ms
09:31:44 INFO - PROCESS | 1504 | 1477589504156 Marionette TRACE conn3 -> [0,87,"getWindowHandle",null]
09:31:44 INFO - PROCESS | 1504 | 1477589504158 Marionette TRACE conn3 <- [1,87,null,{"value":"13"}]
09:31:44 INFO - TEST-START | /XMLHttpRequest/data-uri.htm
09:31:44 INFO - PROCESS | 1504 | 1477589504163 Marionette TRACE conn3 -> [0,88,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:44 INFO - PROCESS | 1504 | 1477589504277 Marionette TRACE conn3 <- [1,88,null,{"value":null}]
09:31:44 INFO - PROCESS | 1504 | 1477589504342 Marionette TRACE conn3 -> [0,89,"getWindowHandles",null]
09:31:44 INFO - PROCESS | 1504 | 1477589504347 Marionette TRACE conn3 <- [1,89,null,["13"]]
09:31:44 INFO - PROCESS | 1504 | 1477589504395 Marionette TRACE conn3 -> [0,90,"switchToWindow",{"name":"13"}]
09:31:44 INFO - PROCESS | 1504 | 1477589504403 Marionette TRACE conn3 <- [1,90,null,{}]
09:31:44 INFO - PROCESS | 1504 | 1477589504410 Marionette TRACE conn3 -> [0,91,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/data-uri.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/data-uri.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:44 INFO - PROCESS | 1504 | ++DOCSHELL 0FA86800 == 23 [pid = 1504] [id = 27]
09:31:44 INFO - PROCESS | 1504 | ++DOMWINDOW == 60 (0FA86C00) [pid = 1504] [serial = 78] [outer = 00000000]
09:31:44 INFO - PROCESS | 1504 | ++DOMWINDOW == 61 (0FD75C00) [pid = 1504] [serial = 79] [outer = 0FA86C00]
09:31:44 INFO - PROCESS | 1504 | 1477589504481 Marionette DEBUG loaded listener.js
09:31:44 INFO - PROCESS | 1504 | ++DOMWINDOW == 62 (0FF04000) [pid = 1504] [serial = 80] [outer = 0FA86C00]
09:31:44 INFO - PROCESS | 1504 | 1477589504963 Marionette TRACE conn3 <- [1,91,null,{"value":["/XMLHttpRequest/data-uri.htm",0,null,null,[["XHR method GET with charset text/plain",0,null,null],["XHR method GET with charset text/plain (base64)",0,null,null],["XHR method GET with charset text/html",0,null,null],["XHR method GET with charset text/html;charset=UTF-8",0,null,null],["XHR method GET with charset image/png",1,"assert_equals: expected \"Hello, World!\" but got \"Hello,World!\"","do_test/ [0,92,"getWindowHandle",null]
09:31:45 INFO - PROCESS | 1504 | 1477589505088 Marionette TRACE conn3 <- [1,92,null,{"value":"13"}]
09:31:45 INFO - TEST-START | /XMLHttpRequest/event-abort.htm
09:31:45 INFO - PROCESS | 1504 | 1477589505094 Marionette TRACE conn3 -> [0,93,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:45 INFO - PROCESS | 1504 | 1477589505226 Marionette TRACE conn3 <- [1,93,null,{"value":null}]
09:31:45 INFO - PROCESS | 1504 | 1477589505295 Marionette TRACE conn3 -> [0,94,"getWindowHandles",null]
09:31:45 INFO - PROCESS | 1504 | 1477589505298 Marionette TRACE conn3 <- [1,94,null,["13"]]
09:31:45 INFO - PROCESS | 1504 | 1477589505302 Marionette TRACE conn3 -> [0,95,"switchToWindow",{"name":"13"}]
09:31:45 INFO - PROCESS | 1504 | 1477589505307 Marionette TRACE conn3 <- [1,95,null,{}]
09:31:45 INFO - PROCESS | 1504 | 1477589505353 Marionette TRACE conn3 -> [0,96,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-abort.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:45 INFO - PROCESS | 1504 | ++DOCSHELL 14848400 == 24 [pid = 1504] [id = 28]
09:31:45 INFO - PROCESS | 1504 | ++DOMWINDOW == 63 (1484A000) [pid = 1504] [serial = 81] [outer = 00000000]
09:31:45 INFO - PROCESS | 1504 | ++DOMWINDOW == 64 (16A13400) [pid = 1504] [serial = 82] [outer = 1484A000]
09:31:45 INFO - PROCESS | 1504 | 1477589505421 Marionette DEBUG loaded listener.js
09:31:45 INFO - PROCESS | 1504 | ++DOMWINDOW == 65 (16B6A000) [pid = 1504] [serial = 83] [outer = 1484A000]
09:31:45 INFO - PROCESS | 1504 | 1477589505836 Marionette TRACE conn3 <- [1,96,null,{"value":["/XMLHttpRequest/event-abort.htm",0,null,null,[["XMLHttpRequest: abort event",0,null,null]]]}]
09:31:45 INFO - .
09:31:45 INFO - TEST-OK | /XMLHttpRequest/event-abort.htm | took 771ms
09:31:45 INFO - PROCESS | 1504 | 1477589505856 Marionette TRACE conn3 -> [0,97,"getWindowHandle",null]
09:31:45 INFO - PROCESS | 1504 | 1477589505859 Marionette TRACE conn3 <- [1,97,null,{"value":"13"}]
09:31:45 INFO - TEST-START | /XMLHttpRequest/event-error-order.sub.html
09:31:45 INFO - PROCESS | 1504 | 1477589505864 Marionette TRACE conn3 -> [0,98,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:45 INFO - PROCESS | 1504 | 1477589505986 Marionette TRACE conn3 <- [1,98,null,{"value":null}]
09:31:46 INFO - PROCESS | 1504 | 1477589506062 Marionette TRACE conn3 -> [0,99,"getWindowHandles",null]
09:31:46 INFO - PROCESS | 1504 | 1477589506068 Marionette TRACE conn3 <- [1,99,null,["13"]]
09:31:46 INFO - PROCESS | 1504 | 1477589506113 Marionette TRACE conn3 -> [0,100,"switchToWindow",{"name":"13"}]
09:31:46 INFO - PROCESS | 1504 | 1477589506118 Marionette TRACE conn3 <- [1,100,null,{}]
09:31:46 INFO - PROCESS | 1504 | 1477589506122 Marionette TRACE conn3 -> [0,101,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error-order.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:46 INFO - PROCESS | 1504 | ++DOCSHELL 1918F000 == 25 [pid = 1504] [id = 29]
09:31:46 INFO - PROCESS | 1504 | ++DOMWINDOW == 66 (1918F800) [pid = 1504] [serial = 84] [outer = 00000000]
09:31:46 INFO - PROCESS | 1504 | ++DOMWINDOW == 67 (192CEC00) [pid = 1504] [serial = 85] [outer = 1918F800]
09:31:46 INFO - PROCESS | 1504 | 1477589506194 Marionette DEBUG loaded listener.js
09:31:46 INFO - PROCESS | 1504 | ++DOMWINDOW == 68 (19767800) [pid = 1504] [serial = 86] [outer = 1918F800]
09:31:46 INFO - PROCESS | 1504 | --DOCSHELL 16A0B800 == 24 [pid = 1504] [id = 11]
09:31:46 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
09:31:46 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 1293
09:31:46 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
09:31:46 INFO - PROCESS | 1504 | 1477589506878 Marionette TRACE conn3 <- [1,101,null,{"value":["/XMLHttpRequest/event-error-order.sub.html",0,null,null,[["XMLHttpRequest: event - error (order of events)",0,null,null]]]}]
09:31:46 INFO - .
09:31:46 INFO - TEST-OK | /XMLHttpRequest/event-error-order.sub.html | took 1080ms
09:31:46 INFO - PROCESS | 1504 | 1477589506946 Marionette TRACE conn3 -> [0,102,"getWindowHandle",null]
09:31:46 INFO - PROCESS | 1504 | 1477589506951 Marionette TRACE conn3 <- [1,102,null,{"value":"13"}]
09:31:46 INFO - TEST-START | /XMLHttpRequest/event-error.sub.html
09:31:46 INFO - PROCESS | 1504 | 1477589506959 Marionette TRACE conn3 -> [0,103,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:47 INFO - PROCESS | 1504 | 1477589507078 Marionette TRACE conn3 <- [1,103,null,{"value":null}]
09:31:47 INFO - PROCESS | 1504 | 1477589507153 Marionette TRACE conn3 -> [0,104,"getWindowHandles",null]
09:31:47 INFO - PROCESS | 1504 | 1477589507158 Marionette TRACE conn3 <- [1,104,null,["13"]]
09:31:47 INFO - PROCESS | 1504 | 1477589507163 Marionette TRACE conn3 -> [0,105,"switchToWindow",{"name":"13"}]
09:31:47 INFO - PROCESS | 1504 | 1477589507171 Marionette TRACE conn3 <- [1,105,null,{}]
09:31:47 INFO - PROCESS | 1504 | 1477589507177 Marionette TRACE conn3 -> [0,106,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:47 INFO - PROCESS | 1504 | ++DOCSHELL 128B2000 == 25 [pid = 1504] [id = 30]
09:31:47 INFO - PROCESS | 1504 | ++DOMWINDOW == 69 (13C45400) [pid = 1504] [serial = 87] [outer = 00000000]
09:31:47 INFO - PROCESS | 1504 | ++DOMWINDOW == 70 (1449DC00) [pid = 1504] [serial = 88] [outer = 13C45400]
09:31:47 INFO - PROCESS | 1504 | 1477589507239 Marionette DEBUG loaded listener.js
09:31:47 INFO - PROCESS | 1504 | ++DOMWINDOW == 71 (14840C00) [pid = 1504] [serial = 89] [outer = 13C45400]
09:31:47 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
09:31:47 INFO - PROCESS | 1504 | 1477589507881 Marionette TRACE conn3 <- [1,106,null,{"value":["/XMLHttpRequest/event-error.sub.html",0,null,null,[["XMLHttpRequest Test: event - error",0,null,null]]]}]
09:31:47 INFO - .
09:31:47 INFO - TEST-OK | /XMLHttpRequest/event-error.sub.html | took 941ms
09:31:47 INFO - PROCESS | 1504 | 1477589507900 Marionette TRACE conn3 -> [0,107,"getWindowHandle",null]
09:31:47 INFO - TEST-START | /XMLHttpRequest/event-load.htm
09:31:47 INFO - PROCESS | 1504 | 1477589507904 Marionette TRACE conn3 <- [1,107,null,{"value":"13"}]
09:31:47 INFO - PROCESS | 1504 | 1477589507909 Marionette TRACE conn3 -> [0,108,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:48 INFO - PROCESS | 1504 | 1477589507996 Marionette TRACE conn3 <- [1,108,null,{"value":null}]
09:31:48 INFO - PROCESS | 1504 | 1477589508002 Marionette TRACE conn3 -> [0,109,"getWindowHandles",null]
09:31:48 INFO - PROCESS | 1504 | 1477589508005 Marionette TRACE conn3 <- [1,109,null,["13"]]
09:31:48 INFO - PROCESS | 1504 | 1477589508010 Marionette TRACE conn3 -> [0,110,"switchToWindow",{"name":"13"}]
09:31:48 INFO - PROCESS | 1504 | 1477589508013 Marionette TRACE conn3 <- [1,110,null,{}]
09:31:48 INFO - PROCESS | 1504 | 1477589508017 Marionette TRACE conn3 -> [0,111,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-load.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-load.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:48 INFO - PROCESS | 1504 | ++DOCSHELL 141D2800 == 26 [pid = 1504] [id = 31]
09:31:48 INFO - PROCESS | 1504 | ++DOMWINDOW == 72 (14314400) [pid = 1504] [serial = 90] [outer = 00000000]
09:31:48 INFO - PROCESS | 1504 | ++DOMWINDOW == 73 (16A0E800) [pid = 1504] [serial = 91] [outer = 14314400]
09:31:48 INFO - PROCESS | 1504 | 1477589508076 Marionette DEBUG loaded listener.js
09:31:48 INFO - PROCESS | 1504 | ++DOMWINDOW == 74 (16A12C00) [pid = 1504] [serial = 92] [outer = 14314400]
09:31:48 INFO - PROCESS | 1504 | 1477589508480 Marionette TRACE conn3 <- [1,111,null,{"value":["/XMLHttpRequest/event-load.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire an event named load (synchronous flag is unset)",0,null,null]]]}]
09:31:48 INFO - .
09:31:48 INFO - TEST-OK | /XMLHttpRequest/event-load.htm | took 632ms
09:31:48 INFO - PROCESS | 1504 | 1477589508532 Marionette TRACE conn3 -> [0,112,"getWindowHandle",null]
09:31:48 INFO - PROCESS | 1504 | 1477589508537 Marionette TRACE conn3 <- [1,112,null,{"value":"13"}]
09:31:48 INFO - PROCESS | 1504 | 1477589508542 Marionette TRACE conn3 -> [0,113,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:48 INFO - TEST-START | /XMLHttpRequest/event-loadend.htm
09:31:48 INFO - PROCESS | 1504 | 1477589508639 Marionette TRACE conn3 <- [1,113,null,{"value":null}]
09:31:48 INFO - PROCESS | 1504 | 1477589508704 Marionette TRACE conn3 -> [0,114,"getWindowHandles",null]
09:31:48 INFO - PROCESS | 1504 | 1477589508707 Marionette TRACE conn3 <- [1,114,null,["13"]]
09:31:48 INFO - PROCESS | 1504 | 1477589508710 Marionette TRACE conn3 -> [0,115,"switchToWindow",{"name":"13"}]
09:31:48 INFO - PROCESS | 1504 | 1477589508715 Marionette TRACE conn3 <- [1,115,null,{}]
09:31:48 INFO - PROCESS | 1504 | 1477589508719 Marionette TRACE conn3 -> [0,116,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:48 INFO - PROCESS | 1504 | ++DOCSHELL 1780C400 == 27 [pid = 1504] [id = 32]
09:31:48 INFO - PROCESS | 1504 | ++DOMWINDOW == 75 (1780D400) [pid = 1504] [serial = 93] [outer = 00000000]
09:31:48 INFO - PROCESS | 1504 | ++DOMWINDOW == 76 (17A72800) [pid = 1504] [serial = 94] [outer = 1780D400]
09:31:48 INFO - PROCESS | 1504 | 1477589508778 Marionette DEBUG loaded listener.js
09:31:48 INFO - PROCESS | 1504 | ++DOMWINDOW == 77 (1856E400) [pid = 1504] [serial = 95] [outer = 1780D400]
09:31:49 INFO - PROCESS | 1504 | 1477589509083 Marionette TRACE conn3 <- [1,116,null,{"value":["/XMLHttpRequest/event-loadend.htm",0,null,null,[["XMLHttpRequest: loadend event",0,null,null]]]}]
09:31:49 INFO - .
09:31:49 INFO - TEST-OK | /XMLHttpRequest/event-loadend.htm | took 571ms
09:31:49 INFO - PROCESS | 1504 | 1477589509118 Marionette TRACE conn3 -> [0,117,"getWindowHandle",null]
09:31:49 INFO - PROCESS | 1504 | 1477589509121 Marionette TRACE conn3 <- [1,117,null,{"value":"13"}]
09:31:49 INFO - TEST-START | /XMLHttpRequest/event-loadstart.htm
09:31:49 INFO - PROCESS | 1504 | 1477589509126 Marionette TRACE conn3 -> [0,118,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:49 INFO - PROCESS | 1504 | 1477589509255 Marionette TRACE conn3 <- [1,118,null,{"value":null}]
09:31:49 INFO - PROCESS | 1504 | 1477589509262 Marionette TRACE conn3 -> [0,119,"getWindowHandles",null]
09:31:49 INFO - PROCESS | 1504 | 1477589509264 Marionette TRACE conn3 <- [1,119,null,["13"]]
09:31:49 INFO - PROCESS | 1504 | 1477589509268 Marionette TRACE conn3 -> [0,120,"switchToWindow",{"name":"13"}]
09:31:49 INFO - PROCESS | 1504 | 1477589509272 Marionette TRACE conn3 <- [1,120,null,{}]
09:31:49 INFO - PROCESS | 1504 | 1477589509277 Marionette TRACE conn3 -> [0,121,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadstart.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:49 INFO - PROCESS | 1504 | ++DOCSHELL 19185800 == 28 [pid = 1504] [id = 33]
09:31:49 INFO - PROCESS | 1504 | ++DOMWINDOW == 78 (192C5000) [pid = 1504] [serial = 96] [outer = 00000000]
09:31:49 INFO - PROCESS | 1504 | ++DOMWINDOW == 79 (198B5400) [pid = 1504] [serial = 97] [outer = 192C5000]
09:31:49 INFO - PROCESS | 1504 | 1477589509333 Marionette DEBUG loaded listener.js
09:31:49 INFO - PROCESS | 1504 | ++DOMWINDOW == 80 (19950800) [pid = 1504] [serial = 98] [outer = 192C5000]
09:31:49 INFO - PROCESS | 1504 | 1477589509686 Marionette TRACE conn3 <- [1,121,null,{"value":["/XMLHttpRequest/event-loadstart.htm",0,null,null,[["XMLHttpRequest: loadstart event",0,null,null]]]}]
09:31:49 INFO - .
09:31:49 INFO - TEST-OK | /XMLHttpRequest/event-loadstart.htm | took 632ms
09:31:49 INFO - PROCESS | 1504 | 1477589509744 Marionette TRACE conn3 -> [0,122,"getWindowHandle",null]
09:31:49 INFO - PROCESS | 1504 | 1477589509746 Marionette TRACE conn3 <- [1,122,null,{"value":"13"}]
09:31:49 INFO - TEST-START | /XMLHttpRequest/event-progress.htm
09:31:49 INFO - PROCESS | 1504 | 1477589509750 Marionette TRACE conn3 -> [0,123,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:49 INFO - PROCESS | 1504 | 1477589509872 Marionette TRACE conn3 <- [1,123,null,{"value":null}]
09:31:49 INFO - PROCESS | 1504 | 1477589509877 Marionette TRACE conn3 -> [0,124,"getWindowHandles",null]
09:31:49 INFO - PROCESS | 1504 | 1477589509879 Marionette TRACE conn3 <- [1,124,null,["13"]]
09:31:49 INFO - PROCESS | 1504 | 1477589509882 Marionette TRACE conn3 -> [0,125,"switchToWindow",{"name":"13"}]
09:31:49 INFO - PROCESS | 1504 | 1477589509888 Marionette TRACE conn3 <- [1,125,null,{}]
09:31:49 INFO - PROCESS | 1504 | 1477589509929 Marionette TRACE conn3 -> [0,126,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-progress.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:49 INFO - PROCESS | 1504 | ++DOCSHELL 1A577800 == 29 [pid = 1504] [id = 34]
09:31:49 INFO - PROCESS | 1504 | ++DOMWINDOW == 81 (1A579C00) [pid = 1504] [serial = 99] [outer = 00000000]
09:31:49 INFO - PROCESS | 1504 | ++DOMWINDOW == 82 (1A57DC00) [pid = 1504] [serial = 100] [outer = 1A579C00]
09:31:49 INFO - PROCESS | 1504 | 1477589509983 Marionette DEBUG loaded listener.js
09:31:50 INFO - PROCESS | 1504 | ++DOMWINDOW == 83 (1A57F000) [pid = 1504] [serial = 101] [outer = 1A579C00]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 82 (17A32800) [pid = 1504] [serial = 63] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 81 (192CB400) [pid = 1504] [serial = 69] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 80 (17A34C00) [pid = 1504] [serial = 66] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 79 (1976C800) [pid = 1504] [serial = 72] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 78 (1443E800) [pid = 1504] [serial = 48] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 77 (16A0BC00) [pid = 1504] [serial = 29] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 76 (0FA8C800) [pid = 1504] [serial = 38] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 75 (0FF56800) [pid = 1504] [serial = 41] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 74 (128AF000) [pid = 1504] [serial = 44] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 73 (14848C00) [pid = 1504] [serial = 51] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 72 (16A0A000) [pid = 1504] [serial = 54] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 71 (16D36800) [pid = 1504] [serial = 57] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm]
09:31:51 INFO - PROCESS | 1504 | --DOMWINDOW == 70 (17807800) [pid = 1504] [serial = 60] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm]
09:31:53 INFO - PROCESS | 1504 | 1477589513281 Marionette TRACE conn3 <- [1,126,null,{"value":["/XMLHttpRequest/event-progress.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire a progress event named progress (synchronous flag is unset)",0,null,null]]]}]
09:31:53 INFO - .
09:31:53 INFO - TEST-OK | /XMLHttpRequest/event-progress.htm | took 3538ms
09:31:53 INFO - PROCESS | 1504 | 1477589513297 Marionette TRACE conn3 -> [0,127,"getWindowHandle",null]
09:31:53 INFO - TEST-START | /XMLHttpRequest/event-readystate-sync-open.htm
09:31:53 INFO - PROCESS | 1504 | 1477589513300 Marionette TRACE conn3 <- [1,127,null,{"value":"13"}]
09:31:53 INFO - PROCESS | 1504 | 1477589513304 Marionette TRACE conn3 -> [0,128,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:53 INFO - PROCESS | 1504 | 1477589513441 Marionette TRACE conn3 <- [1,128,null,{"value":null}]
09:31:53 INFO - PROCESS | 1504 | 1477589513448 Marionette TRACE conn3 -> [0,129,"getWindowHandles",null]
09:31:53 INFO - PROCESS | 1504 | 1477589513451 Marionette TRACE conn3 <- [1,129,null,["13"]]
09:31:53 INFO - PROCESS | 1504 | 1477589513454 Marionette TRACE conn3 -> [0,130,"switchToWindow",{"name":"13"}]
09:31:53 INFO - PROCESS | 1504 | 1477589513457 Marionette TRACE conn3 <- [1,130,null,{}]
09:31:53 INFO - PROCESS | 1504 | 1477589513462 Marionette TRACE conn3 -> [0,131,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystate-sync-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:53 INFO - PROCESS | 1504 | ++DOCSHELL 1A57F400 == 30 [pid = 1504] [id = 35]
09:31:53 INFO - PROCESS | 1504 | ++DOMWINDOW == 71 (1A583400) [pid = 1504] [serial = 102] [outer = 00000000]
09:31:53 INFO - PROCESS | 1504 | ++DOMWINDOW == 72 (1A631400) [pid = 1504] [serial = 103] [outer = 1A583400]
09:31:53 INFO - PROCESS | 1504 | 1477589513518 Marionette DEBUG loaded listener.js
09:31:53 INFO - PROCESS | 1504 | ++DOMWINDOW == 73 (1A633400) [pid = 1504] [serial = 104] [outer = 1A583400]
09:31:53 INFO - PROCESS | 1504 | 1477589513990 Marionette TRACE conn3 <- [1,131,null,{"value":["/XMLHttpRequest/event-readystate-sync-open.htm",0,null,null,[["XMLHttpRequest: open() call fires sync readystate event (sync)",0,null,null],["XMLHttpRequest: open() call fires sync readystate event (async)",0,null,null]]]}]
09:31:54 INFO - ..
09:31:54 INFO - TEST-OK | /XMLHttpRequest/event-readystate-sync-open.htm | took 731ms
09:31:54 INFO - PROCESS | 1504 | 1477589514043 Marionette TRACE conn3 -> [0,132,"getWindowHandle",null]
09:31:54 INFO - PROCESS | 1504 | 1477589514048 Marionette TRACE conn3 <- [1,132,null,{"value":"13"}]
09:31:54 INFO - TEST-START | /XMLHttpRequest/event-readystatechange-loaded.htm
09:31:54 INFO - PROCESS | 1504 | 1477589514056 Marionette TRACE conn3 -> [0,133,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:31:54 INFO - PROCESS | 1504 | 1477589514218 Marionette TRACE conn3 <- [1,133,null,{"value":null}]
09:31:54 INFO - PROCESS | 1504 | 1477589514286 Marionette TRACE conn3 -> [0,134,"getWindowHandles",null]
09:31:54 INFO - PROCESS | 1504 | 1477589514290 Marionette TRACE conn3 <- [1,134,null,["13"]]
09:31:54 INFO - PROCESS | 1504 | 1477589514336 Marionette TRACE conn3 -> [0,135,"switchToWindow",{"name":"13"}]
09:31:54 INFO - PROCESS | 1504 | 1477589514341 Marionette TRACE conn3 <- [1,135,null,{}]
09:31:54 INFO - PROCESS | 1504 | 1477589514348 Marionette TRACE conn3 -> [0,136,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystatechange-loaded.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:31:54 INFO - PROCESS | 1504 | ++DOCSHELL 12603000 == 31 [pid = 1504] [id = 36]
09:31:54 INFO - PROCESS | 1504 | ++DOMWINDOW == 74 (12606000) [pid = 1504] [serial = 105] [outer = 00000000]
09:31:54 INFO - PROCESS | 1504 | ++DOMWINDOW == 75 (14558000) [pid = 1504] [serial = 106] [outer = 12606000]
09:31:54 INFO - PROCESS | 1504 | 1477589514420 Marionette DEBUG loaded listener.js
09:31:54 INFO - PROCESS | 1504 | ++DOMWINDOW == 76 (14498400) [pid = 1504] [serial = 107] [outer = 12606000]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 75 (199F5800) [pid = 1504] [serial = 73] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 74 (199F4000) [pid = 1504] [serial = 74] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 73 (192D2400) [pid = 1504] [serial = 70] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 72 (194B9400) [pid = 1504] [serial = 71] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 71 (18DED400) [pid = 1504] [serial = 67] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 70 (18C9A400) [pid = 1504] [serial = 68] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 69 (17A75000) [pid = 1504] [serial = 64] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 68 (18566000) [pid = 1504] [serial = 65] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 67 (17837400) [pid = 1504] [serial = 61] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 66 (17840000) [pid = 1504] [serial = 62] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 65 (17197800) [pid = 1504] [serial = 58] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 64 (17504C00) [pid = 1504] [serial = 59] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 63 (16B66000) [pid = 1504] [serial = 55] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 62 (16B70C00) [pid = 1504] [serial = 56] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 61 (151B3800) [pid = 1504] [serial = 52] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 60 (151B4C00) [pid = 1504] [serial = 53] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 59 (1449F400) [pid = 1504] [serial = 49] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 58 (1455D400) [pid = 1504] [serial = 50] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 57 (12A92400) [pid = 1504] [serial = 45] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 56 (13BEEC00) [pid = 1504] [serial = 46] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 55 (12201C00) [pid = 1504] [serial = 42] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 54 (123BE400) [pid = 1504] [serial = 43] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 53 (0FD73400) [pid = 1504] [serial = 39] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 52 (0FD78800) [pid = 1504] [serial = 40] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 51 (1BE63800) [pid = 1504] [serial = 37] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 50 (16A15400) [pid = 1504] [serial = 31] [outer = 00000000] [url = about:blank]
09:31:56 INFO - PROCESS | 1504 | --DOMWINDOW == 49 (19D37C00) [pid = 1504] [serial = 76] [outer = 00000000] [url = about:blank]
09:31:59 INFO - PROCESS | 1504 | --DOMWINDOW == 48 (1A579C00) [pid = 1504] [serial = 99] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-progress.htm]
09:31:59 INFO - PROCESS | 1504 | --DOMWINDOW == 47 (1780D400) [pid = 1504] [serial = 93] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm]
09:31:59 INFO - PROCESS | 1504 | --DOMWINDOW == 46 (14314400) [pid = 1504] [serial = 90] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-load.htm]
09:31:59 INFO - PROCESS | 1504 | --DOMWINDOW == 45 (13C45400) [pid = 1504] [serial = 87] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html]
09:31:59 INFO - PROCESS | 1504 | --DOMWINDOW == 44 (192C5000) [pid = 1504] [serial = 96] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm]
09:31:59 INFO - PROCESS | 1504 | --DOMWINDOW == 43 (192CF800) [pid = 1504] [serial = 75] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm]
09:32:00 INFO - PROCESS | 1504 | 1477589520797 Marionette TRACE conn3 <- [1,136,null,{"value":["/XMLHttpRequest/event-readystatechange-loaded.htm",0,null,null,[["XMLHttpRequest: the LOADING state change should only happen once",1,"assert_equals: LOADING state change may only be emitted once expected 1 but got 10","client.onreadystatechange<@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:29:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nTest.prototype.step_func/<@http://web-platform.test:8000/resources/testharness.js:1425:20\nEventHandlerNonNull*@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:23:33\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:19:1\n"]]]}]
09:32:00 INFO - .
09:32:00 INFO - TEST-OK | /XMLHttpRequest/event-readystatechange-loaded.htm | took 6812ms
09:32:00 INFO - TEST-START | /XMLHttpRequest/event-timeout-order.htm
09:32:00 INFO - PROCESS | 1504 | 1477589520864 Marionette TRACE conn3 -> [0,137,"getWindowHandle",null]
09:32:00 INFO - PROCESS | 1504 | 1477589520867 Marionette TRACE conn3 <- [1,137,null,{"value":"13"}]
09:32:00 INFO - PROCESS | 1504 | 1477589520874 Marionette TRACE conn3 -> [0,138,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:00 INFO - PROCESS | 1504 | 1477589520990 Marionette TRACE conn3 <- [1,138,null,{"value":null}]
09:32:00 INFO - PROCESS | 1504 | 1477589520998 Marionette TRACE conn3 -> [0,139,"getWindowHandles",null]
09:32:00 INFO - PROCESS | 1504 | 1477589521000 Marionette TRACE conn3 <- [1,139,null,["13"]]
09:32:00 INFO - PROCESS | 1504 | 1477589521004 Marionette TRACE conn3 -> [0,140,"switchToWindow",{"name":"13"}]
09:32:00 INFO - PROCESS | 1504 | 1477589521009 Marionette TRACE conn3 <- [1,140,null,{}]
09:32:00 INFO - PROCESS | 1504 | 1477589521014 Marionette TRACE conn3 -> [0,141,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:01 INFO - PROCESS | 1504 | ++DOCSHELL 1433A400 == 32 [pid = 1504] [id = 37]
09:32:01 INFO - PROCESS | 1504 | ++DOMWINDOW == 44 (1433A800) [pid = 1504] [serial = 108] [outer = 00000000]
09:32:01 INFO - PROCESS | 1504 | ++DOMWINDOW == 45 (14557800) [pid = 1504] [serial = 109] [outer = 1433A800]
09:32:01 INFO - PROCESS | 1504 | 1477589521072 Marionette DEBUG loaded listener.js
09:32:01 INFO - PROCESS | 1504 | ++DOMWINDOW == 46 (14599400) [pid = 1504] [serial = 110] [outer = 1433A800]
09:32:01 INFO - PROCESS | 1504 | 1477589521422 Marionette TRACE conn3 <- [1,141,null,{"value":["/XMLHttpRequest/event-timeout-order.htm",0,null,null,[["XMLHttpRequest: event - timeout (order of events)",0,null,null]]]}]
09:32:01 INFO - .
09:32:01 INFO - TEST-OK | /XMLHttpRequest/event-timeout-order.htm | took 591ms
09:32:01 INFO - PROCESS | 1504 | 1477589521466 Marionette TRACE conn3 -> [0,142,"getWindowHandle",null]
09:32:01 INFO - PROCESS | 1504 | 1477589521470 Marionette TRACE conn3 <- [1,142,null,{"value":"13"}]
09:32:01 INFO - TEST-START | /XMLHttpRequest/event-timeout.htm
09:32:01 INFO - PROCESS | 1504 | 1477589521475 Marionette TRACE conn3 -> [0,143,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:01 INFO - PROCESS | 1504 | 1477589521566 Marionette TRACE conn3 <- [1,143,null,{"value":null}]
09:32:01 INFO - PROCESS | 1504 | 1477589521572 Marionette TRACE conn3 -> [0,144,"getWindowHandles",null]
09:32:01 INFO - PROCESS | 1504 | 1477589521575 Marionette TRACE conn3 <- [1,144,null,["13"]]
09:32:01 INFO - PROCESS | 1504 | 1477589521579 Marionette TRACE conn3 -> [0,145,"switchToWindow",{"name":"13"}]
09:32:01 INFO - PROCESS | 1504 | 1477589521583 Marionette TRACE conn3 <- [1,145,null,{}]
09:32:01 INFO - PROCESS | 1504 | 1477589521587 Marionette TRACE conn3 -> [0,146,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:01 INFO - PROCESS | 1504 | ++DOCSHELL 157F8C00 == 33 [pid = 1504] [id = 38]
09:32:01 INFO - PROCESS | 1504 | ++DOMWINDOW == 47 (157F7400) [pid = 1504] [serial = 111] [outer = 00000000]
09:32:01 INFO - PROCESS | 1504 | ++DOMWINDOW == 48 (16B71800) [pid = 1504] [serial = 112] [outer = 157F7400]
09:32:01 INFO - PROCESS | 1504 | 1477589521644 Marionette DEBUG loaded listener.js
09:32:01 INFO - PROCESS | 1504 | ++DOMWINDOW == 49 (16D2F400) [pid = 1504] [serial = 113] [outer = 157F7400]
09:32:02 INFO - PROCESS | 1504 | 1477589522021 Marionette TRACE conn3 <- [1,146,null,{"value":["/XMLHttpRequest/event-timeout.htm",0,null,null,[["XMLHttpRequest: timeout event",0,null,null]]]}]
09:32:02 INFO - .
09:32:02 INFO - TEST-OK | /XMLHttpRequest/event-timeout.htm | took 591ms
09:32:02 INFO - PROCESS | 1504 | 1477589522071 Marionette TRACE conn3 -> [0,147,"getWindowHandle",null]
09:32:02 INFO - PROCESS | 1504 | 1477589522076 Marionette TRACE conn3 <- [1,147,null,{"value":"13"}]
09:32:02 INFO - TEST-START | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm
09:32:02 INFO - PROCESS | 1504 | 1477589522084 Marionette TRACE conn3 -> [0,148,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:02 INFO - PROCESS | 1504 | 1477589522251 Marionette TRACE conn3 <- [1,148,null,{"value":null}]
09:32:02 INFO - PROCESS | 1504 | 1477589522403 addons.productaddons WARN Failed downloading XML, status: 0, reason: error
09:32:02 INFO - PROCESS | 1504 | 1477589522413 Marionette TRACE conn3 -> [0,149,"getWindowHandles",null]
09:32:02 INFO - PROCESS | 1504 | 1477589522421 Marionette TRACE conn3 <- [1,149,null,["13"]]
09:32:02 INFO - PROCESS | 1504 | 1477589522430 Marionette TRACE conn3 -> [0,150,"switchToWindow",{"name":"13"}]
09:32:02 INFO - PROCESS | 1504 | 1477589522437 Marionette TRACE conn3 <- [1,150,null,{}]
09:32:02 INFO - PROCESS | 1504 | 1477589522442 Marionette TRACE conn3 -> [0,151,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:02 INFO - PROCESS | 1504 | ++DOCSHELL 14C7B800 == 34 [pid = 1504] [id = 39]
09:32:02 INFO - PROCESS | 1504 | ++DOMWINDOW == 50 (14C81400) [pid = 1504] [serial = 114] [outer = 00000000]
09:32:02 INFO - PROCESS | 1504 | ++DOMWINDOW == 51 (16A0FC00) [pid = 1504] [serial = 115] [outer = 14C81400]
09:32:02 INFO - PROCESS | 1504 | 1477589522515 Marionette DEBUG loaded listener.js
09:32:02 INFO - PROCESS | 1504 | ++DOMWINDOW == 52 (16A18400) [pid = 1504] [serial = 116] [outer = 14C81400]
09:32:02 INFO - PROCESS | 1504 | 1477589522960 Marionette TRACE conn3 <- [1,151,null,{"value":["/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm",0,null,null,[["XMLHttpRequest: upload progress event for cross-origin requests",0,null,null]]]}]
09:32:03 INFO - .
09:32:03 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm | took 949ms
09:32:03 INFO - PROCESS | 1504 | 1477589523033 Marionette TRACE conn3 -> [0,152,"getWindowHandle",null]
09:32:03 INFO - PROCESS | 1504 | 1477589523038 Marionette TRACE conn3 <- [1,152,null,{"value":"13"}]
09:32:03 INFO - TEST-START | /XMLHttpRequest/event-upload-progress.htm
09:32:03 INFO - PROCESS | 1504 | 1477589523085 Marionette TRACE conn3 -> [0,153,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:03 INFO - PROCESS | 1504 | 1477589523197 Marionette TRACE conn3 <- [1,153,null,{"value":null}]
09:32:03 INFO - PROCESS | 1504 | 1477589523304 Marionette TRACE conn3 -> [0,154,"getWindowHandles",null]
09:32:03 INFO - PROCESS | 1504 | 1477589523307 Marionette TRACE conn3 <- [1,154,null,["13"]]
09:32:03 INFO - PROCESS | 1504 | 1477589523311 Marionette TRACE conn3 -> [0,155,"switchToWindow",{"name":"13"}]
09:32:03 INFO - PROCESS | 1504 | 1477589523316 Marionette TRACE conn3 <- [1,155,null,{}]
09:32:03 INFO - PROCESS | 1504 | 1477589523320 Marionette TRACE conn3 -> [0,156,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:03 INFO - PROCESS | 1504 | ++DOCSHELL 17837800 == 35 [pid = 1504] [id = 40]
09:32:03 INFO - PROCESS | 1504 | ++DOMWINDOW == 53 (1783FC00) [pid = 1504] [serial = 117] [outer = 00000000]
09:32:03 INFO - PROCESS | 1504 | ++DOMWINDOW == 54 (17A34C00) [pid = 1504] [serial = 118] [outer = 1783FC00]
09:32:03 INFO - PROCESS | 1504 | 1477589523388 Marionette DEBUG loaded listener.js
09:32:03 INFO - PROCESS | 1504 | ++DOMWINDOW == 55 (17A6DC00) [pid = 1504] [serial = 119] [outer = 1783FC00]
09:32:03 INFO - PROCESS | 1504 | 1477589523829 Marionette TRACE conn3 <- [1,156,null,{"value":["/XMLHttpRequest/event-upload-progress.htm",0,null,null,[["XMLHttpRequest: upload progress event",0,null,null]]]}]
09:32:03 INFO - .
09:32:03 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress.htm | took 778ms
09:32:03 INFO - PROCESS | 1504 | 1477589523879 Marionette TRACE conn3 -> [0,157,"getWindowHandle",null]
09:32:03 INFO - PROCESS | 1504 | 1477589523886 Marionette TRACE conn3 <- [1,157,null,{"value":"13"}]
09:32:03 INFO - TEST-START | /XMLHttpRequest/formdata-blob.htm
09:32:03 INFO - PROCESS | 1504 | 1477589523893 Marionette TRACE conn3 -> [0,158,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:04 INFO - PROCESS | 1504 | 1477589524044 Marionette TRACE conn3 <- [1,158,null,{"value":null}]
09:32:04 INFO - PROCESS | 1504 | 1477589524112 Marionette TRACE conn3 -> [0,159,"getWindowHandles",null]
09:32:04 INFO - PROCESS | 1504 | 1477589524115 Marionette TRACE conn3 <- [1,159,null,["13"]]
09:32:04 INFO - PROCESS | 1504 | 1477589524119 Marionette TRACE conn3 -> [0,160,"switchToWindow",{"name":"13"}]
09:32:04 INFO - PROCESS | 1504 | 1477589524125 Marionette TRACE conn3 <- [1,160,null,{}]
09:32:04 INFO - PROCESS | 1504 | 1477589524171 Marionette TRACE conn3 -> [0,161,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-blob.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:04 INFO - PROCESS | 1504 | ++DOCSHELL 18571000 == 36 [pid = 1504] [id = 41]
09:32:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 56 (18872C00) [pid = 1504] [serial = 120] [outer = 00000000]
09:32:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 57 (18EEB800) [pid = 1504] [serial = 121] [outer = 18872C00]
09:32:04 INFO - PROCESS | 1504 | 1477589524242 Marionette DEBUG loaded listener.js
09:32:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 58 (19186400) [pid = 1504] [serial = 122] [outer = 18872C00]
09:32:04 INFO - PROCESS | 1504 | 1477589524683 Marionette TRACE conn3 <- [1,161,null,{"value":["/XMLHttpRequest/formdata-blob.htm",0,null,null,[["formdata with blob",0,null,null],["formdata with named blob",0,null,null],["formdata.append() should throw if value is string and file name is given",0,null,null]]]}]
09:32:04 INFO - ...
09:32:04 INFO - TEST-OK | /XMLHttpRequest/formdata-blob.htm | took 839ms
09:32:04 INFO - PROCESS | 1504 | 1477589524737 Marionette TRACE conn3 -> [0,162,"getWindowHandle",null]
09:32:04 INFO - PROCESS | 1504 | 1477589524740 Marionette TRACE conn3 <- [1,162,null,{"value":"13"}]
09:32:04 INFO - TEST-START | /XMLHttpRequest/formdata-delete.htm
09:32:04 INFO - PROCESS | 1504 | 1477589524745 Marionette TRACE conn3 -> [0,163,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:04 INFO - PROCESS | 1504 | 1477589524859 Marionette TRACE conn3 <- [1,163,null,{"value":null}]
09:32:04 INFO - PROCESS | 1504 | 1477589524924 Marionette TRACE conn3 -> [0,164,"getWindowHandles",null]
09:32:04 INFO - PROCESS | 1504 | 1477589524927 Marionette TRACE conn3 <- [1,164,null,["13"]]
09:32:04 INFO - PROCESS | 1504 | 1477589524974 Marionette TRACE conn3 -> [0,165,"switchToWindow",{"name":"13"}]
09:32:04 INFO - PROCESS | 1504 | 1477589524978 Marionette TRACE conn3 <- [1,165,null,{}]
09:32:04 INFO - PROCESS | 1504 | 1477589524985 Marionette TRACE conn3 -> [0,166,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-delete.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:04 INFO - PROCESS | 1504 | ++DOCSHELL 0FF0D400 == 37 [pid = 1504] [id = 42]
09:32:04 INFO - PROCESS | 1504 | ++DOMWINDOW == 59 (12607400) [pid = 1504] [serial = 123] [outer = 00000000]
09:32:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 60 (16B6BC00) [pid = 1504] [serial = 124] [outer = 12607400]
09:32:05 INFO - PROCESS | 1504 | 1477589525036 Marionette DEBUG loaded listener.js
09:32:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 61 (19762400) [pid = 1504] [serial = 125] [outer = 12607400]
09:32:05 INFO - PROCESS | 1504 | 1477589525510 Marionette TRACE conn3 <- [1,166,null,{"value":["/XMLHttpRequest/formdata-delete.htm",0,null,null,[["testFormDataDelete",0,null,null],["testFormDataDeleteFromForm",0,null,null],["testFormDataDeleteFromFormNonExistentKey",0,null,null],["testFormDataDeleteFromFormOtherKey",0,null,null],["testFormDataDeleteFromEmptyForm",0,null,null],["testFormDataDeleteNonExistentKey",0,null,null],["testFormDataDeleteOtherKey",0,null,null]]]}]
09:32:05 INFO - .......
09:32:05 INFO - TEST-OK | /XMLHttpRequest/formdata-delete.htm | took 824ms
09:32:05 INFO - PROCESS | 1504 | 1477589525572 Marionette TRACE conn3 -> [0,167,"getWindowHandle",null]
09:32:05 INFO - PROCESS | 1504 | 1477589525577 Marionette TRACE conn3 <- [1,167,null,{"value":"13"}]
09:32:05 INFO - TEST-START | /XMLHttpRequest/formdata-foreach.html
09:32:05 INFO - PROCESS | 1504 | 1477589525630 Marionette TRACE conn3 -> [0,168,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:05 INFO - PROCESS | 1504 | 1477589525768 Marionette TRACE conn3 <- [1,168,null,{"value":null}]
09:32:05 INFO - PROCESS | 1504 | 1477589525838 Marionette TRACE conn3 -> [0,169,"getWindowHandles",null]
09:32:05 INFO - PROCESS | 1504 | 1477589525842 Marionette TRACE conn3 <- [1,169,null,["13"]]
09:32:05 INFO - PROCESS | 1504 | 1477589525846 Marionette TRACE conn3 -> [0,170,"switchToWindow",{"name":"13"}]
09:32:05 INFO - PROCESS | 1504 | 1477589525851 Marionette TRACE conn3 <- [1,170,null,{}]
09:32:05 INFO - PROCESS | 1504 | 1477589525856 Marionette TRACE conn3 -> [0,171,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-foreach.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:05 INFO - PROCESS | 1504 | ++DOCSHELL 1260A400 == 38 [pid = 1504] [id = 43]
09:32:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 62 (1260F800) [pid = 1504] [serial = 126] [outer = 00000000]
09:32:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 63 (14314400) [pid = 1504] [serial = 127] [outer = 1260F800]
09:32:05 INFO - PROCESS | 1504 | 1477589525917 Marionette DEBUG loaded listener.js
09:32:05 INFO - PROCESS | 1504 | ++DOMWINDOW == 64 (141C5000) [pid = 1504] [serial = 128] [outer = 1260F800]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 63 (1A57DC00) [pid = 1504] [serial = 100] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 62 (1A57F000) [pid = 1504] [serial = 101] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 61 (198B5400) [pid = 1504] [serial = 97] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 60 (19950800) [pid = 1504] [serial = 98] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 59 (17A72800) [pid = 1504] [serial = 94] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 58 (1856E400) [pid = 1504] [serial = 95] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 57 (16A0E800) [pid = 1504] [serial = 91] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 56 (16A12C00) [pid = 1504] [serial = 92] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 55 (1449DC00) [pid = 1504] [serial = 88] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 54 (14840C00) [pid = 1504] [serial = 89] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 53 (192CEC00) [pid = 1504] [serial = 85] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 52 (16A13400) [pid = 1504] [serial = 82] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 51 (0FD75C00) [pid = 1504] [serial = 79] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | --DOMWINDOW == 50 (1A575C00) [pid = 1504] [serial = 77] [outer = 00000000] [url = about:blank]
09:32:06 INFO - PROCESS | 1504 | 1477589526258 Marionette TRACE conn3 <- [1,171,null,{"value":["/XMLHttpRequest/formdata-foreach.html",0,null,null,[["Iterator should return duplicate keys and non-deleted values",0,null,null],["Entries iterator should return duplicate keys and non-deleted values",0,null,null],["Keys iterator should return duplicates",0,null,null],["Values iterator should return non-deleted values",0,null,null]]]}]
09:32:06 INFO - ....
09:32:06 INFO - TEST-OK | /XMLHttpRequest/formdata-foreach.html | took 731ms
09:32:06 INFO - PROCESS | 1504 | 1477589526322 Marionette TRACE conn3 -> [0,172,"getWindowHandle",null]
09:32:06 INFO - PROCESS | 1504 | 1477589526326 Marionette TRACE conn3 <- [1,172,null,{"value":"13"}]
09:32:06 INFO - PROCESS | 1504 | 1477589526331 Marionette TRACE conn3 -> [0,173,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:06 INFO - TEST-START | /XMLHttpRequest/formdata-get.htm
09:32:06 INFO - PROCESS | 1504 | 1477589526431 Marionette TRACE conn3 <- [1,173,null,{"value":null}]
09:32:06 INFO - PROCESS | 1504 | 1477589526506 Marionette TRACE conn3 -> [0,174,"getWindowHandles",null]
09:32:06 INFO - PROCESS | 1504 | 1477589526509 Marionette TRACE conn3 <- [1,174,null,["13"]]
09:32:06 INFO - PROCESS | 1504 | 1477589526512 Marionette TRACE conn3 -> [0,175,"switchToWindow",{"name":"13"}]
09:32:06 INFO - PROCESS | 1504 | 1477589526516 Marionette TRACE conn3 <- [1,175,null,{}]
09:32:06 INFO - PROCESS | 1504 | 1477589526523 Marionette TRACE conn3 -> [0,176,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-get.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:06 INFO - PROCESS | 1504 | ++DOCSHELL 12A91C00 == 39 [pid = 1504] [id = 44]
09:32:06 INFO - PROCESS | 1504 | ++DOMWINDOW == 51 (13E3AC00) [pid = 1504] [serial = 129] [outer = 00000000]
09:32:06 INFO - PROCESS | 1504 | ++DOMWINDOW == 52 (16A0F400) [pid = 1504] [serial = 130] [outer = 13E3AC00]
09:32:06 INFO - PROCESS | 1504 | 1477589526579 Marionette DEBUG loaded listener.js
09:32:06 INFO - PROCESS | 1504 | ++DOMWINDOW == 53 (16A77400) [pid = 1504] [serial = 131] [outer = 13E3AC00]
09:32:06 INFO - PROCESS | 1504 | 1477589526920 Marionette TRACE conn3 <- [1,176,null,{"value":["/XMLHttpRequest/formdata-get.htm",0,null,null,[["testFormDataGet",0,null,null],["testFormDataGetFromForm",0,null,null],["testFormDataGetFromFormNull",0,null,null],["testFormDataGetFromEmptyForm",0,null,null],["testFormDataGetNull1",0,null,null],["testFormDataGetNull2",0,null,null],["testFormDataGetAll",0,null,null],["testFormDataGetAllEmpty1",0,null,null],["testFormDataGetAllEmpty2",0,null,null],["testFormDataGetAllFromForm",0,null,null],["testFormDataGetAllFromFormNull",0,null,null],["testFormDataGetAllFromEmptyForm",0,null,null]]]}]
09:32:06 INFO - ............
09:32:06 INFO - TEST-OK | /XMLHttpRequest/formdata-get.htm | took 638ms
09:32:06 INFO - PROCESS | 1504 | 1477589526978 Marionette TRACE conn3 -> [0,177,"getWindowHandle",null]
09:32:06 INFO - PROCESS | 1504 | 1477589526983 Marionette TRACE conn3 <- [1,177,null,{"value":"13"}]
09:32:06 INFO - TEST-START | /XMLHttpRequest/formdata-has.htm
09:32:06 INFO - PROCESS | 1504 | 1477589526992 Marionette TRACE conn3 -> [0,178,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:07 INFO - PROCESS | 1504 | 1477589527088 Marionette TRACE conn3 <- [1,178,null,{"value":null}]
09:32:07 INFO - PROCESS | 1504 | 1477589527094 Marionette TRACE conn3 -> [0,179,"getWindowHandles",null]
09:32:07 INFO - PROCESS | 1504 | 1477589527097 Marionette TRACE conn3 <- [1,179,null,["13"]]
09:32:07 INFO - PROCESS | 1504 | 1477589527101 Marionette TRACE conn3 -> [0,180,"switchToWindow",{"name":"13"}]
09:32:07 INFO - PROCESS | 1504 | 1477589527107 Marionette TRACE conn3 <- [1,180,null,{}]
09:32:07 INFO - PROCESS | 1504 | 1477589527110 Marionette TRACE conn3 -> [0,181,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-has.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:07 INFO - PROCESS | 1504 | ++DOCSHELL 18870000 == 40 [pid = 1504] [id = 45]
09:32:07 INFO - PROCESS | 1504 | ++DOMWINDOW == 54 (18870400) [pid = 1504] [serial = 132] [outer = 00000000]
09:32:07 INFO - PROCESS | 1504 | ++DOMWINDOW == 55 (1949DC00) [pid = 1504] [serial = 133] [outer = 18870400]
09:32:07 INFO - PROCESS | 1504 | 1477589527168 Marionette DEBUG loaded listener.js
09:32:07 INFO - PROCESS | 1504 | ++DOMWINDOW == 56 (19950800) [pid = 1504] [serial = 134] [outer = 18870400]
09:32:07 INFO - PROCESS | 1504 | 1477589527545 Marionette TRACE conn3 <- [1,181,null,{"value":["/XMLHttpRequest/formdata-has.htm",0,null,null,[["testFormDataHas",0,null,null],["testFormDataHasFromForm",0,null,null],["testFormDataHasFromFormNull",0,null,null],["testFormDataHasFromEmptyForm",0,null,null],["testFormDataHasEmpty1",0,null,null],["testFormDataHasEmpty2",0,null,null]]]}]
09:32:07 INFO - ......
09:32:07 INFO - TEST-OK | /XMLHttpRequest/formdata-has.htm | took 591ms
09:32:07 INFO - PROCESS | 1504 | 1477589527585 Marionette TRACE conn3 -> [0,182,"getWindowHandle",null]
09:32:07 INFO - PROCESS | 1504 | 1477589527588 Marionette TRACE conn3 <- [1,182,null,{"value":"13"}]
09:32:07 INFO - TEST-START | /XMLHttpRequest/formdata-set.htm
09:32:07 INFO - PROCESS | 1504 | 1477589527593 Marionette TRACE conn3 -> [0,183,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:07 INFO - PROCESS | 1504 | 1477589527696 Marionette TRACE conn3 <- [1,183,null,{"value":null}]
09:32:07 INFO - PROCESS | 1504 | 1477589527703 Marionette TRACE conn3 -> [0,184,"getWindowHandles",null]
09:32:07 INFO - PROCESS | 1504 | 1477589527706 Marionette TRACE conn3 <- [1,184,null,["13"]]
09:32:07 INFO - PROCESS | 1504 | 1477589527777 Marionette TRACE conn3 -> [0,185,"switchToWindow",{"name":"13"}]
09:32:07 INFO - PROCESS | 1504 | 1477589527781 Marionette TRACE conn3 <- [1,185,null,{}]
09:32:07 INFO - PROCESS | 1504 | 1477589527785 Marionette TRACE conn3 -> [0,186,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-set.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:07 INFO - PROCESS | 1504 | ++DOCSHELL 19D39C00 == 41 [pid = 1504] [id = 46]
09:32:07 INFO - PROCESS | 1504 | ++DOMWINDOW == 57 (1A575400) [pid = 1504] [serial = 135] [outer = 00000000]
09:32:07 INFO - PROCESS | 1504 | ++DOMWINDOW == 58 (1A579400) [pid = 1504] [serial = 136] [outer = 1A575400]
09:32:07 INFO - PROCESS | 1504 | 1477589527840 Marionette DEBUG loaded listener.js
09:32:07 INFO - PROCESS | 1504 | ++DOMWINDOW == 59 (1A578C00) [pid = 1504] [serial = 137] [outer = 1A575400]
09:32:08 INFO - PROCESS | 1504 | --DOMWINDOW == 58 (1433A800) [pid = 1504] [serial = 108] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm]
09:32:08 INFO - PROCESS | 1504 | 1477589528243 Marionette TRACE conn3 <- [1,186,null,{"value":["/XMLHttpRequest/formdata-set.htm",0,null,null,[["Passing a String object to FormData.set should work",0,null,null],["testFormDataSet1",0,null,null],["testFormDataSet2",0,null,null],["testFormDataSetUndefined1",0,null,null],["testFormDataSetUndefined2",0,null,null],["testFormDataSetNull1",0,null,null],["testFormDataSetNull2",0,null,null],["testFormDataSetToForm1",0,null,null],["testFormDataSetToForm2",0,null,null],["testFormDataSetToFormUndefined1",0,null,null],["testFormDataSetToFormUndefined2",0,null,null],["testFormDataSetToFormNull1",0,null,null],["testFormDataSetToFormNull2",0,null,null],["testFormDataSetEmptyBlob",0,null,null]]]}]
09:32:08 INFO - ..............
09:32:08 INFO - TEST-OK | /XMLHttpRequest/formdata-set.htm | took 685ms
09:32:08 INFO - PROCESS | 1504 | 1477589528291 Marionette TRACE conn3 -> [0,187,"getWindowHandle",null]
09:32:08 INFO - PROCESS | 1504 | 1477589528293 Marionette TRACE conn3 <- [1,187,null,{"value":"13"}]
09:32:08 INFO - TEST-START | /XMLHttpRequest/formdata.htm
09:32:08 INFO - PROCESS | 1504 | 1477589528298 Marionette TRACE conn3 -> [0,188,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:08 INFO - PROCESS | 1504 | 1477589528419 Marionette TRACE conn3 <- [1,188,null,{"value":null}]
09:32:08 INFO - PROCESS | 1504 | 1477589528460 Marionette TRACE conn3 -> [0,189,"getWindowHandles",null]
09:32:08 INFO - PROCESS | 1504 | 1477589528464 Marionette TRACE conn3 <- [1,189,null,["13"]]
09:32:08 INFO - PROCESS | 1504 | 1477589528467 Marionette TRACE conn3 -> [0,190,"switchToWindow",{"name":"13"}]
09:32:08 INFO - PROCESS | 1504 | 1477589528471 Marionette TRACE conn3 <- [1,190,null,{}]
09:32:08 INFO - PROCESS | 1504 | 1477589528474 Marionette TRACE conn3 -> [0,191,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:08 INFO - PROCESS | 1504 | ++DOCSHELL 1994EC00 == 42 [pid = 1504] [id = 47]
09:32:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 59 (199F9C00) [pid = 1504] [serial = 138] [outer = 00000000]
09:32:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 60 (1A722000) [pid = 1504] [serial = 139] [outer = 199F9C00]
09:32:08 INFO - PROCESS | 1504 | 1477589528515 Marionette DEBUG loaded listener.js
09:32:08 INFO - PROCESS | 1504 | ++DOMWINDOW == 61 (1A724000) [pid = 1504] [serial = 140] [outer = 199F9C00]
09:32:08 INFO - PROCESS | 1504 | 1477589528844 Marionette TRACE conn3 <- [1,191,null,{"value":["/XMLHttpRequest/formdata.htm",0,null,null,[["empty formdata",0,null,null],["formdata with string",0,null,null],["formdata with named string",0,null,null],["formdata from form",0,null,null]]]}]
09:32:08 INFO - ....
09:32:08 INFO - TEST-OK | /XMLHttpRequest/formdata.htm | took 591ms
09:32:08 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-cookies.htm
09:32:08 INFO - PROCESS | 1504 | 1477589528878 Marionette TRACE conn3 -> [0,192,"getWindowHandle",null]
09:32:08 INFO - PROCESS | 1504 | 1477589528880 Marionette TRACE conn3 <- [1,192,null,{"value":"13"}]
09:32:08 INFO - PROCESS | 1504 | 1477589528884 Marionette TRACE conn3 -> [0,193,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:09 INFO - PROCESS | 1504 | 1477589529025 Marionette TRACE conn3 <- [1,193,null,{"value":null}]
09:32:09 INFO - PROCESS | 1504 | 1477589529032 Marionette TRACE conn3 -> [0,194,"getWindowHandles",null]
09:32:09 INFO - PROCESS | 1504 | 1477589529034 Marionette TRACE conn3 <- [1,194,null,["13"]]
09:32:09 INFO - PROCESS | 1504 | 1477589529038 Marionette TRACE conn3 -> [0,195,"switchToWindow",{"name":"13"}]
09:32:09 INFO - PROCESS | 1504 | 1477589529042 Marionette TRACE conn3 <- [1,195,null,{}]
09:32:09 INFO - PROCESS | 1504 | 1477589529045 Marionette TRACE conn3 -> [0,196,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-cookies.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:09 INFO - PROCESS | 1504 | ++DOCSHELL 1A727400 == 43 [pid = 1504] [id = 48]
09:32:09 INFO - PROCESS | 1504 | ++DOMWINDOW == 62 (1AD01400) [pid = 1504] [serial = 141] [outer = 00000000]
09:32:09 INFO - PROCESS | 1504 | ++DOMWINDOW == 63 (1ADB4800) [pid = 1504] [serial = 142] [outer = 1AD01400]
09:32:09 INFO - PROCESS | 1504 | 1477589529105 Marionette DEBUG loaded listener.js
09:32:09 INFO - PROCESS | 1504 | ++DOMWINDOW == 64 (1ADB5C00) [pid = 1504] [serial = 143] [outer = 1AD01400]
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | 1477589529426 Marionette TRACE conn3 <- [1,196,null,{"value":["/XMLHttpRequest/getallresponseheaders-cookies.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes cookies",0,null,null]]]}]
09:32:09 INFO - .
09:32:09 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-cookies.htm | took 591ms
09:32:09 INFO - PROCESS | 1504 | 1477589529480 Marionette TRACE conn3 -> [0,197,"getWindowHandle",null]
09:32:09 INFO - PROCESS | 1504 | 1477589529482 Marionette TRACE conn3 <- [1,197,null,{"value":"13"}]
09:32:09 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-status.htm
09:32:09 INFO - PROCESS | 1504 | 1477589529486 Marionette TRACE conn3 -> [0,198,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:09 INFO - PROCESS | 1504 | 1477589529576 Marionette TRACE conn3 <- [1,198,null,{"value":null}]
09:32:09 INFO - PROCESS | 1504 | 1477589529645 Marionette TRACE conn3 -> [0,199,"getWindowHandles",null]
09:32:09 INFO - PROCESS | 1504 | 1477589529647 Marionette TRACE conn3 <- [1,199,null,["13"]]
09:32:09 INFO - PROCESS | 1504 | 1477589529651 Marionette TRACE conn3 -> [0,200,"switchToWindow",{"name":"13"}]
09:32:09 INFO - PROCESS | 1504 | 1477589529655 Marionette TRACE conn3 <- [1,200,null,{}]
09:32:09 INFO - PROCESS | 1504 | 1477589529658 Marionette TRACE conn3 -> [0,201,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-status.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:09 INFO - PROCESS | 1504 | ++DOCSHELL 1750A000 == 44 [pid = 1504] [id = 49]
09:32:09 INFO - PROCESS | 1504 | ++DOMWINDOW == 65 (1B0BD800) [pid = 1504] [serial = 144] [outer = 00000000]
09:32:09 INFO - PROCESS | 1504 | ++DOMWINDOW == 66 (1B180400) [pid = 1504] [serial = 145] [outer = 1B0BD800]
09:32:09 INFO - PROCESS | 1504 | 1477589529717 Marionette DEBUG loaded listener.js
09:32:09 INFO - PROCESS | 1504 | ++DOMWINDOW == 67 (1B182000) [pid = 1504] [serial = 146] [outer = 1B0BD800]
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:09 INFO - PROCESS | 1504 | 1477589530000 Marionette TRACE conn3 <- [1,201,null,{"value":["/XMLHttpRequest/getallresponseheaders-status.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes status",0,null,null]]]}]
09:32:10 INFO - .
09:32:10 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-status.htm | took 528ms
09:32:10 INFO - PROCESS | 1504 | 1477589530021 Marionette TRACE conn3 -> [0,202,"getWindowHandle",null]
09:32:10 INFO - PROCESS | 1504 | 1477589530023 Marionette TRACE conn3 <- [1,202,null,{"value":"13"}]
09:32:10 INFO - TEST-START | /XMLHttpRequest/getresponseheader-case-insensitive.htm
09:32:10 INFO - PROCESS | 1504 | 1477589530027 Marionette TRACE conn3 -> [0,203,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:10 INFO - PROCESS | 1504 | 1477589530143 Marionette TRACE conn3 <- [1,203,null,{"value":null}]
09:32:10 INFO - PROCESS | 1504 | 1477589530151 Marionette TRACE conn3 -> [0,204,"getWindowHandles",null]
09:32:10 INFO - PROCESS | 1504 | 1477589530153 Marionette TRACE conn3 <- [1,204,null,["13"]]
09:32:10 INFO - PROCESS | 1504 | 1477589530156 Marionette TRACE conn3 -> [0,205,"switchToWindow",{"name":"13"}]
09:32:10 INFO - PROCESS | 1504 | 1477589530160 Marionette TRACE conn3 <- [1,205,null,{}]
09:32:10 INFO - PROCESS | 1504 | 1477589530163 Marionette TRACE conn3 -> [0,206,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:10 INFO - PROCESS | 1504 | ++DOCSHELL 1B0CBC00 == 45 [pid = 1504] [id = 50]
09:32:10 INFO - PROCESS | 1504 | ++DOMWINDOW == 68 (1B173800) [pid = 1504] [serial = 147] [outer = 00000000]
09:32:10 INFO - PROCESS | 1504 | ++DOMWINDOW == 69 (1B6B6400) [pid = 1504] [serial = 148] [outer = 1B173800]
09:32:10 INFO - PROCESS | 1504 | 1477589530216 Marionette DEBUG loaded listener.js
09:32:10 INFO - PROCESS | 1504 | ++DOMWINDOW == 70 (1B182800) [pid = 1504] [serial = 149] [outer = 1B173800]
09:32:10 INFO - PROCESS | 1504 | 1477589530534 Marionette TRACE conn3 <- [1,206,null,{"value":["/XMLHttpRequest/getresponseheader-case-insensitive.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() case-insensitive matching",0,null,null]]]}]
09:32:10 INFO - .
09:32:10 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-case-insensitive.htm | took 529ms
09:32:10 INFO - PROCESS | 1504 | 1477589530562 Marionette TRACE conn3 -> [0,207,"getWindowHandle",null]
09:32:10 INFO - PROCESS | 1504 | 1477589530564 Marionette TRACE conn3 <- [1,207,null,{"value":"13"}]
09:32:10 INFO - TEST-START | /XMLHttpRequest/getresponseheader-chunked-trailer.htm
09:32:10 INFO - PROCESS | 1504 | 1477589530568 Marionette TRACE conn3 -> [0,208,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:10 INFO - PROCESS | 1504 | 1477589530659 Marionette TRACE conn3 <- [1,208,null,{"value":null}]
09:32:10 INFO - PROCESS | 1504 | 1477589530664 Marionette TRACE conn3 -> [0,209,"getWindowHandles",null]
09:32:10 INFO - PROCESS | 1504 | 1477589530666 Marionette TRACE conn3 <- [1,209,null,["13"]]
09:32:10 INFO - PROCESS | 1504 | 1477589530670 Marionette TRACE conn3 -> [0,210,"switchToWindow",{"name":"13"}]
09:32:10 INFO - PROCESS | 1504 | 1477589530673 Marionette TRACE conn3 <- [1,210,null,{}]
09:32:10 INFO - PROCESS | 1504 | 1477589530677 Marionette TRACE conn3 -> [0,211,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-chunked-trailer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:10 INFO - PROCESS | 1504 | ++DOCSHELL 1B378800 == 46 [pid = 1504] [id = 51]
09:32:10 INFO - PROCESS | 1504 | ++DOMWINDOW == 71 (1B378C00) [pid = 1504] [serial = 150] [outer = 00000000]
09:32:10 INFO - PROCESS | 1504 | ++DOMWINDOW == 72 (1BB1A000) [pid = 1504] [serial = 151] [outer = 1B378C00]
09:32:10 INFO - PROCESS | 1504 | 1477589530797 Marionette DEBUG loaded listener.js
09:32:10 INFO - PROCESS | 1504 | ++DOMWINDOW == 73 (1BB1C000) [pid = 1504] [serial = 152] [outer = 1B378C00]
09:32:11 INFO - PROCESS | 1504 | 1477589531074 Marionette TRACE conn3 <- [1,211,null,{"value":["/XMLHttpRequest/getresponseheader-chunked-trailer.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() and HTTP trailer",0,null,null]]]}]
09:32:11 INFO - .
09:32:11 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-chunked-trailer.htm | took 529ms
09:32:11 INFO - PROCESS | 1504 | 1477589531103 Marionette TRACE conn3 -> [0,212,"getWindowHandle",null]
09:32:11 INFO - PROCESS | 1504 | 1477589531105 Marionette TRACE conn3 <- [1,212,null,{"value":"13"}]
09:32:11 INFO - TEST-START | /XMLHttpRequest/getresponseheader-cookies-and-more.htm
09:32:11 INFO - PROCESS | 1504 | 1477589531109 Marionette TRACE conn3 -> [0,213,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:11 INFO - PROCESS | 1504 | 1477589531224 Marionette TRACE conn3 <- [1,213,null,{"value":null}]
09:32:11 INFO - PROCESS | 1504 | 1477589531231 Marionette TRACE conn3 -> [0,214,"getWindowHandles",null]
09:32:11 INFO - PROCESS | 1504 | 1477589531233 Marionette TRACE conn3 <- [1,214,null,["13"]]
09:32:11 INFO - PROCESS | 1504 | 1477589531237 Marionette TRACE conn3 -> [0,215,"switchToWindow",{"name":"13"}]
09:32:11 INFO - PROCESS | 1504 | 1477589531240 Marionette TRACE conn3 <- [1,215,null,{}]
09:32:11 INFO - PROCESS | 1504 | 1477589531245 Marionette TRACE conn3 -> [0,216,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-cookies-and-more.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:11 INFO - PROCESS | 1504 | ++DOCSHELL 1BB15400 == 47 [pid = 1504] [id = 52]
09:32:11 INFO - PROCESS | 1504 | ++DOMWINDOW == 74 (1BB19C00) [pid = 1504] [serial = 153] [outer = 00000000]
09:32:11 INFO - PROCESS | 1504 | ++DOMWINDOW == 75 (1BD40C00) [pid = 1504] [serial = 154] [outer = 1BB19C00]
09:32:11 INFO - PROCESS | 1504 | 1477589531298 Marionette DEBUG loaded listener.js
09:32:11 INFO - PROCESS | 1504 | ++DOMWINDOW == 76 (1BD3FC00) [pid = 1504] [serial = 155] [outer = 1BB19C00]
09:32:11 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:11 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:11 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:11 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:11 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:11 INFO - PROCESS | 1504 | [1504] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
09:32:11 INFO - PROCESS | 1504 | 1477589531625 Marionette TRACE conn3 <- [1,216,null,{"value":["/XMLHttpRequest/getresponseheader-cookies-and-more.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() custom/non-existent headers and cookies",0,null,null]]]}]
09:32:11 INFO - .
09:32:11 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-cookies-and-more.htm | took 529ms
09:32:11 INFO - PROCESS | 1504 | 1477589531644 Marionette TRACE conn3 -> [0,217,"getWindowHandle",null]
09:32:11 INFO - PROCESS | 1504 | 1477589531646 Marionette TRACE conn3 <- [1,217,null,{"value":"13"}]
09:32:11 INFO - TEST-START | /XMLHttpRequest/getresponseheader-error-state.htm
09:32:11 INFO - PROCESS | 1504 | 1477589531651 Marionette TRACE conn3 -> [0,218,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:11 INFO - PROCESS | 1504 | 1477589531795 Marionette TRACE conn3 <- [1,218,null,{"value":null}]
09:32:11 INFO - PROCESS | 1504 | 1477589531909 Marionette TRACE conn3 -> [0,219,"getWindowHandles",null]
09:32:11 INFO - PROCESS | 1504 | 1477589531914 Marionette TRACE conn3 <- [1,219,null,["13"]]
09:32:11 INFO - PROCESS | 1504 | 1477589531923 Marionette TRACE conn3 -> [0,220,"switchToWindow",{"name":"13"}]
09:32:11 INFO - PROCESS | 1504 | 1477589531931 Marionette TRACE conn3 <- [1,220,null,{}]
09:32:11 INFO - PROCESS | 1504 | 1477589531939 Marionette TRACE conn3 -> [0,221,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-error-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:11 INFO - PROCESS | 1504 | ++DOCSHELL 0FD7F800 == 48 [pid = 1504] [id = 53]
09:32:11 INFO - PROCESS | 1504 | ++DOMWINDOW == 77 (0FF06800) [pid = 1504] [serial = 156] [outer = 00000000]
09:32:12 INFO - PROCESS | 1504 | ++DOMWINDOW == 78 (1260AC00) [pid = 1504] [serial = 157] [outer = 0FF06800]
09:32:12 INFO - PROCESS | 1504 | 1477589532009 Marionette DEBUG loaded listener.js
09:32:12 INFO - PROCESS | 1504 | ++DOMWINDOW == 79 (123CAC00) [pid = 1504] [serial = 158] [outer = 0FF06800]
09:32:12 INFO - PROCESS | 1504 | 1477589532425 Marionette TRACE conn3 <- [1,221,null,{"value":["/XMLHttpRequest/getresponseheader-error-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in error state (failing cross-origin test)",0,null,null]]]}]
09:32:12 INFO - .
09:32:12 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-error-state.htm | took 824ms
09:32:12 INFO - PROCESS | 1504 | 1477589532478 Marionette TRACE conn3 -> [0,222,"getWindowHandle",null]
09:32:12 INFO - TEST-START | /XMLHttpRequest/getresponseheader-server-date.htm
09:32:12 INFO - PROCESS | 1504 | 1477589532484 Marionette TRACE conn3 <- [1,222,null,{"value":"13"}]
09:32:12 INFO - PROCESS | 1504 | 1477589532491 Marionette TRACE conn3 -> [0,223,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:12 INFO - PROCESS | 1504 | 1477589532650 Marionette TRACE conn3 <- [1,223,null,{"value":null}]
09:32:12 INFO - PROCESS | 1504 | 1477589532768 Marionette TRACE conn3 -> [0,224,"getWindowHandles",null]
09:32:12 INFO - PROCESS | 1504 | 1477589532772 Marionette TRACE conn3 <- [1,224,null,["13"]]
09:32:12 INFO - PROCESS | 1504 | 1477589532781 Marionette TRACE conn3 -> [0,225,"switchToWindow",{"name":"13"}]
09:32:12 INFO - PROCESS | 1504 | 1477589532788 Marionette TRACE conn3 <- [1,225,null,{}]
09:32:12 INFO - PROCESS | 1504 | 1477589532794 Marionette TRACE conn3 -> [0,226,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-server-date.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:12 INFO - PROCESS | 1504 | ++DOCSHELL 1677AC00 == 49 [pid = 1504] [id = 54]
09:32:12 INFO - PROCESS | 1504 | ++DOMWINDOW == 80 (1677B000) [pid = 1504] [serial = 159] [outer = 00000000]
09:32:12 INFO - PROCESS | 1504 | ++DOMWINDOW == 81 (1677EC00) [pid = 1504] [serial = 160] [outer = 1677B000]
09:32:12 INFO - PROCESS | 1504 | 1477589532862 Marionette DEBUG loaded listener.js
09:32:12 INFO - PROCESS | 1504 | ++DOMWINDOW == 82 (16780800) [pid = 1504] [serial = 161] [outer = 1677B000]
09:32:13 INFO - PROCESS | 1504 | 1477589533274 Marionette TRACE conn3 <- [1,226,null,{"value":["/XMLHttpRequest/getresponseheader-server-date.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() server and date",0,null,null]]]}]
09:32:13 INFO - .
09:32:13 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-server-date.htm | took 840ms
09:32:13 INFO - PROCESS | 1504 | 1477589533331 Marionette TRACE conn3 -> [0,227,"getWindowHandle",null]
09:32:13 INFO - PROCESS | 1504 | 1477589533334 Marionette TRACE conn3 <- [1,227,null,{"value":"13"}]
09:32:13 INFO - TEST-START | /XMLHttpRequest/getresponseheader-special-characters.htm
09:32:13 INFO - PROCESS | 1504 | 1477589533339 Marionette TRACE conn3 -> [0,228,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:13 INFO - PROCESS | 1504 | 1477589533494 Marionette TRACE conn3 <- [1,228,null,{"value":null}]
09:32:13 INFO - PROCESS | 1504 | 1477589533621 Marionette TRACE conn3 -> [0,229,"getWindowHandles",null]
09:32:13 INFO - PROCESS | 1504 | 1477589533628 Marionette TRACE conn3 <- [1,229,null,["13"]]
09:32:13 INFO - PROCESS | 1504 | 1477589533635 Marionette TRACE conn3 -> [0,230,"switchToWindow",{"name":"13"}]
09:32:13 INFO - PROCESS | 1504 | 1477589533640 Marionette TRACE conn3 <- [1,230,null,{}]
09:32:13 INFO - PROCESS | 1504 | 1477589533644 Marionette TRACE conn3 -> [0,231,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-special-characters.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:13 INFO - PROCESS | 1504 | ++DOCSHELL 1856E400 == 50 [pid = 1504] [id = 55]
09:32:13 INFO - PROCESS | 1504 | ++DOMWINDOW == 83 (1856F000) [pid = 1504] [serial = 162] [outer = 00000000]
09:32:13 INFO - PROCESS | 1504 | ++DOMWINDOW == 84 (18EEF000) [pid = 1504] [serial = 163] [outer = 1856F000]
09:32:13 INFO - PROCESS | 1504 | 1477589533709 Marionette DEBUG loaded listener.js
09:32:13 INFO - PROCESS | 1504 | ++DOMWINDOW == 85 (1976A800) [pid = 1504] [serial = 164] [outer = 1856F000]
09:32:14 INFO - PROCESS | 1504 | 1477589534123 Marionette TRACE conn3 <- [1,231,null,{"value":["/XMLHttpRequest/getresponseheader-special-characters.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() funny characters",0,null,null]]]}]
09:32:14 INFO - .
09:32:14 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-special-characters.htm | took 824ms
09:32:14 INFO - PROCESS | 1504 | 1477589534179 Marionette TRACE conn3 -> [0,232,"getWindowHandle",null]
09:32:14 INFO - PROCESS | 1504 | 1477589534181 Marionette TRACE conn3 <- [1,232,null,{"value":"13"}]
09:32:14 INFO - TEST-START | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm
09:32:14 INFO - PROCESS | 1504 | 1477589534187 Marionette TRACE conn3 -> [0,233,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:14 INFO - PROCESS | 1504 | 1477589534315 Marionette TRACE conn3 <- [1,233,null,{"value":null}]
09:32:14 INFO - PROCESS | 1504 | 1477589534431 Marionette TRACE conn3 -> [0,234,"getWindowHandles",null]
09:32:14 INFO - PROCESS | 1504 | 1477589534433 Marionette TRACE conn3 <- [1,234,null,["13"]]
09:32:14 INFO - PROCESS | 1504 | 1477589534438 Marionette TRACE conn3 -> [0,235,"switchToWindow",{"name":"13"}]
09:32:14 INFO - PROCESS | 1504 | 1477589534443 Marionette TRACE conn3 <- [1,235,null,{}]
09:32:14 INFO - PROCESS | 1504 | 1477589534449 Marionette TRACE conn3 -> [0,236,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:14 INFO - PROCESS | 1504 | ++DOCSHELL 14595400 == 51 [pid = 1504] [id = 56]
09:32:14 INFO - PROCESS | 1504 | ++DOMWINDOW == 86 (14841400) [pid = 1504] [serial = 165] [outer = 00000000]
09:32:14 INFO - PROCESS | 1504 | ++DOMWINDOW == 87 (1A62AC00) [pid = 1504] [serial = 166] [outer = 14841400]
09:32:14 INFO - PROCESS | 1504 | 1477589534513 Marionette DEBUG loaded listener.js
09:32:14 INFO - PROCESS | 1504 | ++DOMWINDOW == 88 (1A635800) [pid = 1504] [serial = 167] [outer = 14841400]
09:32:15 INFO - PROCESS | 1504 | 1477589535094 Marionette TRACE conn3 <- [1,236,null,{"value":["/XMLHttpRequest/getresponseheader-unsent-opened-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in unsent, opened states",0,null,null]]]}]
09:32:15 INFO - .
09:32:15 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm | took 933ms
09:32:15 INFO - PROCESS | 1504 | 1477589535131 Marionette TRACE conn3 -> [0,237,"getWindowHandle",null]
09:32:15 INFO - PROCESS | 1504 | 1477589535136 Marionette TRACE conn3 <- [1,237,null,{"value":"13"}]
09:32:15 INFO - TEST-START | /XMLHttpRequest/headers-normalize-response.htm
09:32:15 INFO - PROCESS | 1504 | 1477589535143 Marionette TRACE conn3 -> [0,238,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:15 INFO - PROCESS | 1504 | 1477589535263 Marionette TRACE conn3 <- [1,238,null,{"value":null}]
09:32:15 INFO - PROCESS | 1504 | 1477589535339 Marionette TRACE conn3 -> [0,239,"getWindowHandles",null]
09:32:15 INFO - PROCESS | 1504 | 1477589535342 Marionette TRACE conn3 <- [1,239,null,["13"]]
09:32:15 INFO - PROCESS | 1504 | 1477589535394 Marionette TRACE conn3 -> [0,240,"switchToWindow",{"name":"13"}]
09:32:15 INFO - PROCESS | 1504 | 1477589535400 Marionette TRACE conn3 <- [1,240,null,{}]
09:32:15 INFO - PROCESS | 1504 | 1477589535404 Marionette TRACE conn3 -> [0,241,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/headers-normalize-response.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:15 INFO - PROCESS | 1504 | ++DOCSHELL 1285D800 == 52 [pid = 1504] [id = 57]
09:32:15 INFO - PROCESS | 1504 | ++DOMWINDOW == 89 (12A8E400) [pid = 1504] [serial = 168] [outer = 00000000]
09:32:15 INFO - PROCESS | 1504 | ++DOMWINDOW == 90 (14C82800) [pid = 1504] [serial = 169] [outer = 12A8E400]
09:32:15 INFO - PROCESS | 1504 | 1477589535474 Marionette DEBUG loaded listener.js
09:32:15 INFO - PROCESS | 1504 | ++DOMWINDOW == 91 (157EFC00) [pid = 1504] [serial = 170] [outer = 12A8E400]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 1780C400 == 51 [pid = 1504] [id = 32]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 1BB15400 == 50 [pid = 1504] [id = 52]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 1B378800 == 49 [pid = 1504] [id = 51]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 1B0CBC00 == 48 [pid = 1504] [id = 50]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 1750A000 == 47 [pid = 1504] [id = 49]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 1A727400 == 46 [pid = 1504] [id = 48]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 1994EC00 == 45 [pid = 1504] [id = 47]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 19D39C00 == 44 [pid = 1504] [id = 46]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 18870000 == 43 [pid = 1504] [id = 45]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 12603000 == 42 [pid = 1504] [id = 36]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 12A91C00 == 41 [pid = 1504] [id = 44]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 1260A400 == 40 [pid = 1504] [id = 43]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 0FF0D400 == 39 [pid = 1504] [id = 42]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 18571000 == 38 [pid = 1504] [id = 41]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 17837800 == 37 [pid = 1504] [id = 40]
09:32:15 INFO - PROCESS | 1504 | --DOCSHELL 14C7B800 == 36 [pid = 1504] [id = 39]
09:32:15 INFO - PROCESS | 1504 | --DOMWINDOW == 90 (14557800) [pid = 1504] [serial = 109] [outer = 00000000] [url = about:blank]
09:32:15 INFO - PROCESS | 1504 | --DOMWINDOW == 89 (14599400) [pid = 1504] [serial = 110] [outer = 00000000] [url = about:blank]
09:32:15 INFO - PROCESS | 1504 | --DOMWINDOW == 88 (14558000) [pid = 1504] [serial = 106] [outer = 00000000] [url = about:blank]
09:32:15 INFO - PROCESS | 1504 | --DOMWINDOW == 87 (1A631400) [pid = 1504] [serial = 103] [outer = 00000000] [url = about:blank]
09:32:15 INFO - PROCESS | 1504 | --DOMWINDOW == 86 (16B71800) [pid = 1504] [serial = 112] [outer = 00000000] [url = about:blank]
09:32:16 INFO - PROCESS | 1504 | 1477589536069 Marionette TRACE conn3 <- [1,241,null,{"value":["/XMLHttpRequest/headers-normalize-response.htm",0,null,null,[["Header value: hello_world\\0",0,null,null],["Header value: \\0hello_world",0,null,null],["Header value: hello\\0world",0,null,null],["Header value: __hello_world",0,null,null],["Header value: hello_world__",0,null,null],["Header value: __hello_world__",0,null,null],["Header value: [tab]hello_world",0,null,null],["Header value: hello_world[tab]",0,null,null],["Header value: [tab]hello_world[tab]",0,null,null],["Header value: hello______world",0,null,null],["Header value: hello[tab]world",0,null,null],["Header value: \\0",0,null,null],["Header value: ___",0,null,null],["Header value: [tab]",0,null,null],["Header value: ",0,null,null]]]}]
09:32:16 INFO - ...............
09:32:16 INFO - TEST-OK | /XMLHttpRequest/headers-normalize-response.htm | took 980ms
09:32:16 INFO - PROCESS | 1504 | 1477589536113 Marionette TRACE conn3 -> [0,242,"getWindowHandle",null]
09:32:16 INFO - PROCESS | 1504 | 1477589536116 Marionette TRACE conn3 <- [1,242,null,{"value":"13"}]
09:32:16 INFO - TEST-START | /XMLHttpRequest/interfaces.html
09:32:16 INFO - PROCESS | 1504 | 1477589536122 Marionette TRACE conn3 -> [0,243,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:16 INFO - PROCESS | 1504 | 1477589536221 Marionette TRACE conn3 <- [1,243,null,{"value":null}]
09:32:16 INFO - PROCESS | 1504 | 1477589536227 Marionette TRACE conn3 -> [0,244,"getWindowHandles",null]
09:32:16 INFO - PROCESS | 1504 | 1477589536230 Marionette TRACE conn3 <- [1,244,null,["13"]]
09:32:16 INFO - PROCESS | 1504 | 1477589536234 Marionette TRACE conn3 -> [0,245,"switchToWindow",{"name":"13"}]
09:32:16 INFO - PROCESS | 1504 | 1477589536237 Marionette TRACE conn3 <- [1,245,null,{}]
09:32:16 INFO - PROCESS | 1504 | 1477589536242 Marionette TRACE conn3 -> [0,246,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/interfaces.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/interfaces.html\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:16 INFO - PROCESS | 1504 | ++DOCSHELL 14438C00 == 37 [pid = 1504] [id = 58]
09:32:16 INFO - PROCESS | 1504 | ++DOMWINDOW == 87 (1443BC00) [pid = 1504] [serial = 171] [outer = 00000000]
09:32:16 INFO - PROCESS | 1504 | ++DOMWINDOW == 88 (16A18000) [pid = 1504] [serial = 172] [outer = 1443BC00]
09:32:16 INFO - PROCESS | 1504 | 1477589536299 Marionette DEBUG loaded listener.js
09:32:16 INFO - PROCESS | 1504 | ++DOMWINDOW == 89 (16EA6400) [pid = 1504] [serial = 173] [outer = 1443BC00]
09:32:16 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
09:32:16 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
09:32:16 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
09:32:17 INFO - PROCESS | 1504 | 1477589537353 Marionette TRACE conn3 <- [1,246,null,{"value":["/XMLHttpRequest/interfaces.html",0,null,null,[["XMLHttpRequestEventTarget interface: existence and properties of interface object",0,null,null],["XMLHttpRequestEventTarget interface object length",0,null,null],["XMLHttpRequestEventTarget interface object name",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadstart",0,null,null],["XMLHttpRequestEventTarget interface: attribute onprogress",0,null,null],["XMLHttpRequestEventTarget interface: attribute onabort",0,null,null],["XMLHttpRequestEventTarget interface: attribute onerror",0,null,null],["XMLHttpRequestEventTarget interface: attribute onload",0,null,null],["XMLHttpRequestEventTarget interface: attribute ontimeout",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadend",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface object",0,null,null],["XMLHttpRequestUpload interface object length",0,null,null],["XMLHttpRequestUpload interface object name",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestUpload must be primary interface of (new XMLHttpRequest()).upload",0,null,null],["Stringification of (new XMLHttpRequest()).upload",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: existence and properties of interface object",0,null,null],["XMLHttpRequest interface object length",0,null,null],["XMLHttpRequest interface object name",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequest interface: attribute onreadystatechange",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface object",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface prototype object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface prototype object",0,null,null],["XMLHttpRequest interface: constant DONE on interface object",0,null,null],["XMLHttpRequest interface: constant DONE on interface prototype object",0,null,null],["XMLHttpRequest interface: attribute readyState",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString)",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString,boolean,USVString,USVString)",0,null,null],["XMLHttpRequest interface: operation setRequestHeader(ByteString,ByteString)",0,null,null],["XMLHttpRequest interface: attribute timeout",0,null,null],["XMLHttpRequest interface: attribute withCredentials",0,null,null],["XMLHttpRequest interface: attribute upload",0,null,null],["XMLHttpRequest interface: operation send([object Object],[object Object])",0,null,null],["XMLHttpRequest interface: operation abort()",0,null,null],["XMLHttpRequest interface: attribute responseURL",0,null,null],["XMLHttpRequest interface: attribute status",0,null,null],["XMLHttpRequest interface: attribute statusText",0,null,null],["XMLHttpRequest interface: operation getResponseHeader(ByteString)",0,null,null],["XMLHttpRequest interface: operation getAllResponseHeaders()",0,null,null],["XMLHttpRequest interface: operation overrideMimeType(DOMString)",0,null,null],["XMLHttpRequest interface: attribute responseType",0,null,null],["XMLHttpRequest interface: attribute response",0,null,null],["XMLHttpRequest interface: attribute responseText",0,null,null],["XMLHttpRequest interface: attribute responseXML",0,null,null],["XMLHttpRequest must be primary interface of new XMLHttpRequest()",0,null,null],["Stringification of new XMLHttpRequest()",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"onreadystatechange\" with the proper type (0)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"UNSENT\" with the proper type (1)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"OPENED\" with the proper type (2)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"HEADERS_RECEIVED\" with the proper type (3)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"LOADING\" with the proper type (4)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"DONE\" with the proper type (5)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"readyState\" with the proper type (6)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (7)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (8)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString,boolean,USVString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"setRequestHeader\" with the proper type (9)",0,null,null],["XMLHttpRequest interface: calling setRequestHeader(ByteString,ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"timeout\" with the proper type (10)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"withCredentials\" with the proper type (11)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"upload\" with the proper type (12)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"send\" with the proper type (13)",0,null,null],["XMLHttpRequest interface: calling send([object Object],[object Object]) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"abort\" with the proper type (14)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseURL\" with the proper type (15)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"status\" with the proper type (16)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"statusText\" with the proper type (17)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getResponseHeader\" with the proper type (18)",0,null,null],["XMLHttpRequest interface: calling getResponseHeader(ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getAllResponseHeaders\" with the proper type (19)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"overrideMimeType\" with the proper type (20)",0,null,null],["XMLHttpRequest interface: calling overrideMimeType(DOMString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseType\" with the proper type (21)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"response\" with the proper type (22)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseText\" with the proper type (23)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseXML\" with the proper type (24)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["FormData interface: existence and properties of interface object",0,null,null],["FormData interface object length",0,null,null],["FormData interface object name",0,null,null],["FormData interface: existence and properties of interface prototype object",0,null,null],["FormData interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["FormData interface: operation append(USVString,Blob,USVString)",0,null,null],["FormData interface: operation append(USVString,USVString)",0,null,null],["FormData interface: operation delete(USVString)",0,null,null],["FormData interface: operation get(USVString)",0,null,null],["FormData interface: operation getAll(USVString)",0,null,null],["FormData interface: operation has(USVString)",0,null,null],["FormData interface: operation set(USVString,Blob,USVString)",0,null,null],["FormData interface: operation set(USVString,USVString)",0,null,null],["FormData must be primary interface of new FormData()",0,null,null],["Stringification of new FormData()",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData must be primary interface of new FormData(form)",0,null,null],["Stringification of new FormData(form)",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["ProgressEvent interface: existence and properties of interface object",0,null,null],["ProgressEvent interface object length",0,null,null],["ProgressEvent interface object name",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["ProgressEvent interface: attribute lengthComputable",0,null,null],["ProgressEvent interface: attribute loaded",0,null,null],["ProgressEvent interface: attribute total",0,null,null]]]}]
09:32:17 INFO - ..........................................................................................................................................................................
09:32:17 INFO - TEST-OK | /XMLHttpRequest/interfaces.html | took 1368ms
09:32:17 INFO - PROCESS | 1504 | 1477589537517 Marionette TRACE conn3 -> [0,247,"getWindowHandle",null]
09:32:17 INFO - PROCESS | 1504 | 1477589537522 Marionette TRACE conn3 <- [1,247,null,{"value":"13"}]
09:32:17 INFO - PROCESS | 1504 | 1477589537527 Marionette TRACE conn3 -> [0,248,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:17 INFO - TEST-START | /XMLHttpRequest/open-after-abort.htm
09:32:17 INFO - PROCESS | 1504 | 1477589537623 Marionette TRACE conn3 <- [1,248,null,{"value":null}]
09:32:17 INFO - PROCESS | 1504 | 1477589537630 Marionette TRACE conn3 -> [0,249,"getWindowHandles",null]
09:32:17 INFO - PROCESS | 1504 | 1477589537633 Marionette TRACE conn3 <- [1,249,null,["13"]]
09:32:17 INFO - PROCESS | 1504 | 1477589537636 Marionette TRACE conn3 -> [0,250,"switchToWindow",{"name":"13"}]
09:32:17 INFO - PROCESS | 1504 | 1477589537642 Marionette TRACE conn3 <- [1,250,null,{}]
09:32:17 INFO - PROCESS | 1504 | 1477589537714 Marionette TRACE conn3 -> [0,251,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-abort.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:17 INFO - PROCESS | 1504 | ++DOCSHELL 1A57D000 == 38 [pid = 1504] [id = 59]
09:32:17 INFO - PROCESS | 1504 | ++DOMWINDOW == 90 (1A580800) [pid = 1504] [serial = 174] [outer = 00000000]
09:32:17 INFO - PROCESS | 1504 | ++DOMWINDOW == 91 (1A728000) [pid = 1504] [serial = 175] [outer = 1A580800]
09:32:17 INFO - PROCESS | 1504 | 1477589537772 Marionette DEBUG loaded listener.js
09:32:17 INFO - PROCESS | 1504 | ++DOMWINDOW == 92 (1AD05400) [pid = 1504] [serial = 176] [outer = 1A580800]
09:32:18 INFO - PROCESS | 1504 | 1477589538076 Marionette TRACE conn3 <- [1,251,null,{"value":["/XMLHttpRequest/open-after-abort.htm",0,null,null,[["XMLHttpRequest: open() after abort()",0,null,null]]]}]
09:32:18 INFO - .
09:32:18 INFO - TEST-OK | /XMLHttpRequest/open-after-abort.htm | took 575ms
09:32:18 INFO - PROCESS | 1504 | 1477589538104 Marionette TRACE conn3 -> [0,252,"getWindowHandle",null]
09:32:18 INFO - PROCESS | 1504 | 1477589538107 Marionette TRACE conn3 <- [1,252,null,{"value":"13"}]
09:32:18 INFO - TEST-START | /XMLHttpRequest/open-after-setrequestheader.htm
09:32:18 INFO - PROCESS | 1504 | 1477589538112 Marionette TRACE conn3 -> [0,253,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:18 INFO - PROCESS | 1504 | 1477589538210 Marionette TRACE conn3 <- [1,253,null,{"value":null}]
09:32:18 INFO - PROCESS | 1504 | 1477589538289 Marionette TRACE conn3 -> [0,254,"getWindowHandles",null]
09:32:18 INFO - PROCESS | 1504 | 1477589538292 Marionette TRACE conn3 <- [1,254,null,["13"]]
09:32:18 INFO - PROCESS | 1504 | 1477589538295 Marionette TRACE conn3 -> [0,255,"switchToWindow",{"name":"13"}]
09:32:18 INFO - PROCESS | 1504 | 1477589538299 Marionette TRACE conn3 <- [1,255,null,{}]
09:32:18 INFO - PROCESS | 1504 | 1477589538302 Marionette TRACE conn3 -> [0,256,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-setrequestheader.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-setrequestheader.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:18 INFO - PROCESS | 1504 | ++DOCSHELL 1AFE4400 == 39 [pid = 1504] [id = 60]
09:32:18 INFO - PROCESS | 1504 | ++DOMWINDOW == 93 (1B0BE800) [pid = 1504] [serial = 177] [outer = 00000000]
09:32:18 INFO - PROCESS | 1504 | ++DOMWINDOW == 94 (1B179800) [pid = 1504] [serial = 178] [outer = 1B0BE800]
09:32:18 INFO - PROCESS | 1504 | 1477589538357 Marionette DEBUG loaded listener.js
09:32:18 INFO - PROCESS | 1504 | ++DOMWINDOW == 95 (1B17D000) [pid = 1504] [serial = 179] [outer = 1B0BE800]
09:32:18 INFO - PROCESS | 1504 | 1477589538687 Marionette TRACE conn3 <- [1,256,null,{"value":["/XMLHttpRequest/open-after-setrequestheader.htm",0,null,null,[["XMLHttpRequest: open() after setRequestHeader()",0,null,null]]]}]
09:32:18 INFO - .
09:32:18 INFO - TEST-OK | /XMLHttpRequest/open-after-setrequestheader.htm | took 638ms
09:32:18 INFO - PROCESS | 1504 | 1477589538748 Marionette TRACE conn3 -> [0,257,"getWindowHandle",null]
09:32:18 INFO - PROCESS | 1504 | 1477589538750 Marionette TRACE conn3 <- [1,257,null,{"value":"13"}]
09:32:18 INFO - TEST-START | /XMLHttpRequest/open-during-abort.htm
09:32:18 INFO - PROCESS | 1504 | 1477589538760 Marionette TRACE conn3 -> [0,258,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:18 INFO - PROCESS | 1504 | 1477589538866 Marionette TRACE conn3 <- [1,258,null,{"value":null}]
09:32:18 INFO - PROCESS | 1504 | 1477589538871 Marionette TRACE conn3 -> [0,259,"getWindowHandles",null]
09:32:18 INFO - PROCESS | 1504 | 1477589538873 Marionette TRACE conn3 <- [1,259,null,["13"]]
09:32:18 INFO - PROCESS | 1504 | 1477589538919 Marionette TRACE conn3 -> [0,260,"switchToWindow",{"name":"13"}]
09:32:18 INFO - PROCESS | 1504 | 1477589538925 Marionette TRACE conn3 <- [1,260,null,{}]
09:32:18 INFO - PROCESS | 1504 | 1477589538928 Marionette TRACE conn3 -> [0,261,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-during-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-during-abort.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:18 INFO - PROCESS | 1504 | ++DOCSHELL 1BB11800 == 40 [pid = 1504] [id = 61]
09:32:18 INFO - PROCESS | 1504 | ++DOMWINDOW == 96 (1BB12400) [pid = 1504] [serial = 180] [outer = 00000000]
09:32:18 INFO - PROCESS | 1504 | ++DOMWINDOW == 97 (1BD3F000) [pid = 1504] [serial = 181] [outer = 1BB12400]
09:32:18 INFO - PROCESS | 1504 | 1477589538989 Marionette DEBUG loaded listener.js
09:32:19 INFO - PROCESS | 1504 | ++DOMWINDOW == 98 (1BD44000) [pid = 1504] [serial = 182] [outer = 1BB12400]
09:32:19 INFO - PROCESS | 1504 | 1477589539354 Marionette TRACE conn3 <- [1,261,null,{"value":["/XMLHttpRequest/open-during-abort.htm",0,null,null,[["XMLHttpRequest: open() during abort()",0,null,null]]]}]
09:32:19 INFO - .
09:32:19 INFO - TEST-OK | /XMLHttpRequest/open-during-abort.htm | took 622ms
09:32:19 INFO - PROCESS | 1504 | 1477589539380 Marionette TRACE conn3 -> [0,262,"getWindowHandle",null]
09:32:19 INFO - PROCESS | 1504 | 1477589539382 Marionette TRACE conn3 <- [1,262,null,{"value":"13"}]
09:32:19 INFO - TEST-START | /XMLHttpRequest/open-method-bogus.htm
09:32:19 INFO - PROCESS | 1504 | 1477589539387 Marionette TRACE conn3 -> [0,263,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:19 INFO - PROCESS | 1504 | 1477589539532 Marionette TRACE conn3 <- [1,263,null,{"value":null}]
09:32:19 INFO - PROCESS | 1504 | 1477589539537 Marionette TRACE conn3 -> [0,264,"getWindowHandles",null]
09:32:19 INFO - PROCESS | 1504 | 1477589539539 Marionette TRACE conn3 <- [1,264,null,["13"]]
09:32:19 INFO - PROCESS | 1504 | 1477589539586 Marionette TRACE conn3 -> [0,265,"switchToWindow",{"name":"13"}]
09:32:19 INFO - PROCESS | 1504 | 1477589539589 Marionette TRACE conn3 <- [1,265,null,{}]
09:32:19 INFO - PROCESS | 1504 | 1477589539592 Marionette TRACE conn3 -> [0,266,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-bogus.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:19 INFO - PROCESS | 1504 | ++DOCSHELL 18ABE000 == 41 [pid = 1504] [id = 62]
09:32:19 INFO - PROCESS | 1504 | ++DOMWINDOW == 99 (18ABE400) [pid = 1504] [serial = 183] [outer = 00000000]
09:32:19 INFO - PROCESS | 1504 | ++DOMWINDOW == 100 (18ACA000) [pid = 1504] [serial = 184] [outer = 18ABE400]
09:32:19 INFO - PROCESS | 1504 | 1477589539648 Marionette DEBUG loaded listener.js
09:32:19 INFO - PROCESS | 1504 | ++DOMWINDOW == 101 (18ACB000) [pid = 1504] [serial = 185] [outer = 18ABE400]
09:32:19 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:19 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:19 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:19 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:19 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:19 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:19 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:19 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:20 INFO - PROCESS | 1504 | 1477589540018 Marionette TRACE conn3 <- [1,266,null,{"value":["/XMLHttpRequest/open-method-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus methods ()",0,null,null],["XMLHttpRequest: open() - bogus methods (>)",0,null,null],["XMLHttpRequest: open() - bogus methods ( GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G T)",0,null,null],["XMLHttpRequest: open() - bogus methods (@GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G:ET)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET?)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET\n)",0,null,null]]]}]
09:32:20 INFO - ........
09:32:20 INFO - TEST-OK | /XMLHttpRequest/open-method-bogus.htm | took 669ms
09:32:20 INFO - PROCESS | 1504 | 1477589540065 Marionette TRACE conn3 -> [0,267,"getWindowHandle",null]
09:32:20 INFO - PROCESS | 1504 | 1477589540067 Marionette TRACE conn3 <- [1,267,null,{"value":"13"}]
09:32:20 INFO - TEST-START | /XMLHttpRequest/open-method-case-insensitive.htm
09:32:20 INFO - PROCESS | 1504 | 1477589540071 Marionette TRACE conn3 -> [0,268,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:20 INFO - PROCESS | 1504 | 1477589540200 Marionette TRACE conn3 <- [1,268,null,{"value":null}]
09:32:20 INFO - PROCESS | 1504 | 1477589540206 Marionette TRACE conn3 -> [0,269,"getWindowHandles",null]
09:32:20 INFO - PROCESS | 1504 | 1477589540208 Marionette TRACE conn3 <- [1,269,null,["13"]]
09:32:20 INFO - PROCESS | 1504 | 1477589540212 Marionette TRACE conn3 -> [0,270,"switchToWindow",{"name":"13"}]
09:32:20 INFO - PROCESS | 1504 | 1477589540216 Marionette TRACE conn3 <- [1,270,null,{}]
09:32:20 INFO - PROCESS | 1504 | 1477589540263 Marionette TRACE conn3 -> [0,271,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-insensitive.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:20 INFO - PROCESS | 1504 | ++DOCSHELL 01FA4400 == 42 [pid = 1504] [id = 63]
09:32:20 INFO - PROCESS | 1504 | ++DOMWINDOW == 102 (01FA4800) [pid = 1504] [serial = 186] [outer = 00000000]
09:32:20 INFO - PROCESS | 1504 | ++DOMWINDOW == 103 (18ACB800) [pid = 1504] [serial = 187] [outer = 01FA4800]
09:32:20 INFO - PROCESS | 1504 | 1477589540316 Marionette DEBUG loaded listener.js
09:32:20 INFO - PROCESS | 1504 | ++DOMWINDOW == 104 (01FA9400) [pid = 1504] [serial = 188] [outer = 01FA4800]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 103 (1AD01400) [pid = 1504] [serial = 141] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 102 (1B173800) [pid = 1504] [serial = 147] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 101 (1260F800) [pid = 1504] [serial = 126] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 100 (18870400) [pid = 1504] [serial = 132] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 99 (13E3AC00) [pid = 1504] [serial = 129] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 98 (1B0BD800) [pid = 1504] [serial = 144] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 97 (1B378C00) [pid = 1504] [serial = 150] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 96 (1A575400) [pid = 1504] [serial = 135] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm]
09:32:20 INFO - PROCESS | 1504 | --DOMWINDOW == 95 (199F9C00) [pid = 1504] [serial = 138] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata.htm]
09:32:20 INFO - PROCESS | 1504 | 1477589540878 Marionette TRACE conn3 <- [1,271,null,{"value":["/XMLHttpRequest/open-method-case-insensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-insensitive methods test (DELETE)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (GET)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (HEAD)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (OPTIONS)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (POST)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (PUT)",0,null,null]]]}]
09:32:20 INFO - ......
09:32:20 INFO - TEST-OK | /XMLHttpRequest/open-method-case-insensitive.htm | took 825ms
09:32:20 INFO - PROCESS | 1504 | 1477589540914 Marionette TRACE conn3 -> [0,272,"getWindowHandle",null]
09:32:20 INFO - PROCESS | 1504 | 1477589540916 Marionette TRACE conn3 <- [1,272,null,{"value":"13"}]
09:32:20 INFO - TEST-START | /XMLHttpRequest/open-method-case-sensitive.htm
09:32:20 INFO - PROCESS | 1504 | 1477589540922 Marionette TRACE conn3 -> [0,273,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:20 INFO - PROCESS | 1504 | 1477589541017 Marionette TRACE conn3 <- [1,273,null,{"value":null}]
09:32:21 INFO - PROCESS | 1504 | 1477589541093 Marionette TRACE conn3 -> [0,274,"getWindowHandles",null]
09:32:21 INFO - PROCESS | 1504 | 1477589541095 Marionette TRACE conn3 <- [1,274,null,["13"]]
09:32:21 INFO - PROCESS | 1504 | 1477589541099 Marionette TRACE conn3 -> [0,275,"switchToWindow",{"name":"13"}]
09:32:21 INFO - PROCESS | 1504 | 1477589541102 Marionette TRACE conn3 <- [1,275,null,{}]
09:32:21 INFO - PROCESS | 1504 | 1477589541105 Marionette TRACE conn3 -> [0,276,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-sensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-sensitive.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:21 INFO - PROCESS | 1504 | ++DOCSHELL 01FA8800 == 43 [pid = 1504] [id = 64]
09:32:21 INFO - PROCESS | 1504 | ++DOMWINDOW == 96 (01FA9000) [pid = 1504] [serial = 189] [outer = 00000000]
09:32:21 INFO - PROCESS | 1504 | ++DOMWINDOW == 97 (1A45C800) [pid = 1504] [serial = 190] [outer = 01FA9000]
09:32:21 INFO - PROCESS | 1504 | 1477589541161 Marionette DEBUG loaded listener.js
09:32:21 INFO - PROCESS | 1504 | ++DOMWINDOW == 98 (18ACB400) [pid = 1504] [serial = 191] [outer = 01FA9000]
09:32:21 INFO - PROCESS | 1504 | 1477589541486 Marionette TRACE conn3 <- [1,276,null,{"value":["/XMLHttpRequest/open-method-case-sensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-sensitive methods test (XUNICORN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (xUNIcorn)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (chiCKEN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (PATCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (patCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (copy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (COpy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (inDEX)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (movE)",0,null,null]]]}]
09:32:21 INFO - .........
09:32:21 INFO - TEST-OK | /XMLHttpRequest/open-method-case-sensitive.htm | took 591ms
09:32:21 INFO - TEST-START | /XMLHttpRequest/open-method-insecure.htm
09:32:21 INFO - PROCESS | 1504 | 1477589541518 Marionette TRACE conn3 -> [0,277,"getWindowHandle",null]
09:32:21 INFO - PROCESS | 1504 | 1477589541520 Marionette TRACE conn3 <- [1,277,null,{"value":"13"}]
09:32:21 INFO - PROCESS | 1504 | 1477589541524 Marionette TRACE conn3 -> [0,278,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:21 INFO - PROCESS | 1504 | 1477589541613 Marionette TRACE conn3 <- [1,278,null,{"value":null}]
09:32:21 INFO - PROCESS | 1504 | 1477589541618 Marionette TRACE conn3 -> [0,279,"getWindowHandles",null]
09:32:21 INFO - PROCESS | 1504 | 1477589541620 Marionette TRACE conn3 <- [1,279,null,["13"]]
09:32:21 INFO - PROCESS | 1504 | 1477589541623 Marionette TRACE conn3 -> [0,280,"switchToWindow",{"name":"13"}]
09:32:21 INFO - PROCESS | 1504 | 1477589541626 Marionette TRACE conn3 <- [1,280,null,{}]
09:32:21 INFO - PROCESS | 1504 | 1477589541631 Marionette TRACE conn3 -> [0,281,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-insecure.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-insecure.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:21 INFO - PROCESS | 1504 | ++DOCSHELL 0FD73C00 == 44 [pid = 1504] [id = 65]
09:32:21 INFO - PROCESS | 1504 | ++DOMWINDOW == 99 (12859000) [pid = 1504] [serial = 192] [outer = 00000000]
09:32:21 INFO - PROCESS | 1504 | ++DOMWINDOW == 100 (194DE000) [pid = 1504] [serial = 193] [outer = 12859000]
09:32:21 INFO - PROCESS | 1504 | 1477589541683 Marionette DEBUG loaded listener.js
09:32:21 INFO - PROCESS | 1504 | ++DOMWINDOW == 101 (194E0C00) [pid = 1504] [serial = 194] [outer = 12859000]
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:21 INFO - PROCESS | 1504 | [1504] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
09:32:22 INFO - PROCESS | 1504 | 1477589542054 Marionette TRACE conn3 <- [1,281,null,{"value":["/XMLHttpRequest/open-method-insecure.htm",0,null,null,[["XMLHttpRequest: open() - \"insecure\" methods (track)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACK)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trAck)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trace)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (traCE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connect)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (CONNECT)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connECT)",0,null,null]]]}]
09:32:22 INFO - .........
09:32:22 INFO - TEST-OK | /XMLHttpRequest/open-method-insecure.htm | took 591ms
09:32:22 INFO - PROCESS | 1504 | 1477589542121 Marionette TRACE conn3 -> [0,282,"getWindowHandle",null]
09:32:22 INFO - PROCESS | 1504 | 1477589542123 Marionette TRACE conn3 <- [1,282,null,{"value":"13"}]
09:32:22 INFO - TEST-START | /XMLHttpRequest/open-method-responsetype-set-sync.htm
09:32:22 INFO - PROCESS | 1504 | 1477589542128 Marionette TRACE conn3 -> [0,283,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:22 INFO - PROCESS | 1504 | 1477589542254 Marionette TRACE conn3 <- [1,283,null,{"value":null}]
09:32:22 INFO - PROCESS | 1504 | 1477589542261 Marionette TRACE conn3 -> [0,284,"getWindowHandles",null]
09:32:22 INFO - PROCESS | 1504 | 1477589542263 Marionette TRACE conn3 <- [1,284,null,["13"]]
09:32:22 INFO - PROCESS | 1504 | 1477589542267 Marionette TRACE conn3 -> [0,285,"switchToWindow",{"name":"13"}]
09:32:22 INFO - PROCESS | 1504 | 1477589542270 Marionette TRACE conn3 <- [1,285,null,{}]
09:32:22 INFO - PROCESS | 1504 | 1477589542275 Marionette TRACE conn3 -> [0,286,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-responsetype-set-sync.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-responsetype-set-sync.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:22 INFO - PROCESS | 1504 | ++DOCSHELL 1A464000 == 45 [pid = 1504] [id = 66]
09:32:22 INFO - PROCESS | 1504 | ++DOMWINDOW == 102 (1A465000) [pid = 1504] [serial = 195] [outer = 00000000]
09:32:22 INFO - PROCESS | 1504 | ++DOMWINDOW == 103 (13B2C400) [pid = 1504] [serial = 196] [outer = 1A465000]
09:32:22 INFO - PROCESS | 1504 | 1477589542328 Marionette DEBUG loaded listener.js
09:32:22 INFO - PROCESS | 1504 | ++DOMWINDOW == 104 (13B2FC00) [pid = 1504] [serial = 197] [outer = 1A465000]
09:32:22 INFO - PROCESS | 1504 | 1477589542661 Marionette TRACE conn3 <- [1,286,null,{"value":["/XMLHttpRequest/open-method-responsetype-set-sync.htm",0,null,null,[["XMLHttpRequest: open() sync request not allowed if responseType is set (arraybuffer)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (blob)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (json)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (text)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (document)",0,null,null]]]}]
09:32:22 INFO - .....
09:32:22 INFO - TEST-OK | /XMLHttpRequest/open-method-responsetype-set-sync.htm | took 591ms
09:32:22 INFO - PROCESS | 1504 | 1477589542708 Marionette TRACE conn3 -> [0,287,"getWindowHandle",null]
09:32:22 INFO - PROCESS | 1504 | 1477589542711 Marionette TRACE conn3 <- [1,287,null,{"value":"13"}]
09:32:22 INFO - PROCESS | 1504 | 1477589542715 Marionette TRACE conn3 -> [0,288,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:22 INFO - TEST-START | /XMLHttpRequest/open-open-send.htm
09:32:22 INFO - PROCESS | 1504 | 1477589542854 Marionette TRACE conn3 <- [1,288,null,{"value":null}]
09:32:22 INFO - PROCESS | 1504 | 1477589542977 Marionette TRACE conn3 -> [0,289,"getWindowHandles",null]
09:32:22 INFO - PROCESS | 1504 | 1477589542982 Marionette TRACE conn3 <- [1,289,null,["13"]]
09:32:22 INFO - PROCESS | 1504 | 1477589542993 Marionette TRACE conn3 -> [0,290,"switchToWindow",{"name":"13"}]
09:32:23 INFO - PROCESS | 1504 | 1477589543001 Marionette TRACE conn3 <- [1,290,null,{}]
09:32:23 INFO - PROCESS | 1504 | 1477589543008 Marionette TRACE conn3 -> [0,291,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-send.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:23 INFO - PROCESS | 1504 | ++DOCSHELL 123BFC00 == 46 [pid = 1504] [id = 67]
09:32:23 INFO - PROCESS | 1504 | ++DOMWINDOW == 105 (123C4400) [pid = 1504] [serial = 198] [outer = 00000000]
09:32:23 INFO - PROCESS | 1504 | ++DOMWINDOW == 106 (13B33800) [pid = 1504] [serial = 199] [outer = 123C4400]
09:32:23 INFO - PROCESS | 1504 | 1477589543089 Marionette DEBUG loaded listener.js
09:32:23 INFO - PROCESS | 1504 | ++DOMWINDOW == 107 (13B31400) [pid = 1504] [serial = 200] [outer = 123C4400]
09:32:23 INFO - PROCESS | 1504 | 1477589543537 Marionette TRACE conn3 <- [1,291,null,{"value":["/XMLHttpRequest/open-open-send.htm",0,null,null,[["XMLHttpRequest: open() - open() - send()",0,null,null]]]}]
09:32:23 INFO - .
09:32:23 INFO - TEST-OK | /XMLHttpRequest/open-open-send.htm | took 840ms
09:32:23 INFO - PROCESS | 1504 | 1477589543561 Marionette TRACE conn3 -> [0,292,"getWindowHandle",null]
09:32:23 INFO - PROCESS | 1504 | 1477589543567 Marionette TRACE conn3 <- [1,292,null,{"value":"13"}]
09:32:23 INFO - TEST-START | /XMLHttpRequest/open-open-sync-send.htm
09:32:23 INFO - PROCESS | 1504 | 1477589543573 Marionette TRACE conn3 -> [0,293,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:23 INFO - PROCESS | 1504 | 1477589543701 Marionette TRACE conn3 <- [1,293,null,{"value":null}]
09:32:23 INFO - PROCESS | 1504 | 1477589543824 Marionette TRACE conn3 -> [0,294,"getWindowHandles",null]
09:32:23 INFO - PROCESS | 1504 | 1477589543828 Marionette TRACE conn3 <- [1,294,null,["13"]]
09:32:23 INFO - PROCESS | 1504 | 1477589543833 Marionette TRACE conn3 -> [0,295,"switchToWindow",{"name":"13"}]
09:32:23 INFO - PROCESS | 1504 | 1477589543838 Marionette TRACE conn3 <- [1,295,null,{}]
09:32:23 INFO - PROCESS | 1504 | 1477589543844 Marionette TRACE conn3 -> [0,296,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-sync-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-sync-send.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:23 INFO - PROCESS | 1504 | ++DOCSHELL 151AC800 == 47 [pid = 1504] [id = 68]
09:32:23 INFO - PROCESS | 1504 | ++DOMWINDOW == 108 (16777400) [pid = 1504] [serial = 201] [outer = 00000000]
09:32:23 INFO - PROCESS | 1504 | ++DOMWINDOW == 109 (16D2EC00) [pid = 1504] [serial = 202] [outer = 16777400]
09:32:23 INFO - PROCESS | 1504 | 1477589543916 Marionette DEBUG loaded listener.js
09:32:23 INFO - PROCESS | 1504 | ++DOMWINDOW == 110 (16EA5000) [pid = 1504] [serial = 203] [outer = 16777400]
09:32:24 INFO - PROCESS | 1504 | 1477589544326 Marionette TRACE conn3 <- [1,296,null,{"value":["/XMLHttpRequest/open-open-sync-send.htm",0,null,null,[["XMLHttpRequest: open() - open() (sync) - send()",0,null,null]]]}]
09:32:24 INFO - .
09:32:24 INFO - TEST-OK | /XMLHttpRequest/open-open-sync-send.htm | took 777ms
09:32:24 INFO - PROCESS | 1504 | 1477589544353 Marionette TRACE conn3 -> [0,297,"getWindowHandle",null]
09:32:24 INFO - PROCESS | 1504 | 1477589544356 Marionette TRACE conn3 <- [1,297,null,{"value":"13"}]
09:32:24 INFO - TEST-START | /XMLHttpRequest/open-referer.htm
09:32:24 INFO - PROCESS | 1504 | 1477589544362 Marionette TRACE conn3 -> [0,298,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:24 INFO - PROCESS | 1504 | 1477589544487 Marionette TRACE conn3 <- [1,298,null,{"value":null}]
09:32:24 INFO - PROCESS | 1504 | 1477589544617 Marionette TRACE conn3 -> [0,299,"getWindowHandles",null]
09:32:24 INFO - PROCESS | 1504 | 1477589544623 Marionette TRACE conn3 <- [1,299,null,["13"]]
09:32:24 INFO - PROCESS | 1504 | 1477589544631 Marionette TRACE conn3 -> [0,300,"switchToWindow",{"name":"13"}]
09:32:24 INFO - PROCESS | 1504 | 1477589544636 Marionette TRACE conn3 <- [1,300,null,{}]
09:32:24 INFO - PROCESS | 1504 | 1477589544640 Marionette TRACE conn3 -> [0,301,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-referer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-referer.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:24 INFO - PROCESS | 1504 | ++DOCSHELL 18AC5400 == 48 [pid = 1504] [id = 69]
09:32:24 INFO - PROCESS | 1504 | ++DOMWINDOW == 111 (18AC5800) [pid = 1504] [serial = 204] [outer = 00000000]
09:32:24 INFO - PROCESS | 1504 | ++DOMWINDOW == 112 (192CE400) [pid = 1504] [serial = 205] [outer = 18AC5800]
09:32:24 INFO - PROCESS | 1504 | 1477589544704 Marionette DEBUG loaded listener.js
09:32:24 INFO - PROCESS | 1504 | ++DOMWINDOW == 113 (194DF000) [pid = 1504] [serial = 206] [outer = 18AC5800]
09:32:25 INFO - PROCESS | 1504 | 1477589545132 Marionette TRACE conn3 <- [1,301,null,{"value":["/XMLHttpRequest/open-referer.htm",0,null,null,[["XMLHttpRequest: open() - value of Referer header",0,null,null]]]}]
09:32:25 INFO - .
09:32:25 INFO - TEST-OK | /XMLHttpRequest/open-referer.htm | took 794ms
09:32:25 INFO - PROCESS | 1504 | 1477589545160 Marionette TRACE conn3 -> [0,302,"getWindowHandle",null]
09:32:25 INFO - PROCESS | 1504 | 1477589545162 Marionette TRACE conn3 <- [1,302,null,{"value":"13"}]
09:32:25 INFO - TEST-START | /XMLHttpRequest/open-send-open.htm
09:32:25 INFO - PROCESS | 1504 | 1477589545168 Marionette TRACE conn3 -> [0,303,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:25 INFO - PROCESS | 1504 | 1477589545294 Marionette TRACE conn3 <- [1,303,null,{"value":null}]
09:32:25 INFO - PROCESS | 1504 | 1477589545372 Marionette TRACE conn3 -> [0,304,"getWindowHandles",null]
09:32:25 INFO - PROCESS | 1504 | 1477589545374 Marionette TRACE conn3 <- [1,304,null,["13"]]
09:32:25 INFO - PROCESS | 1504 | 1477589545422 Marionette TRACE conn3 -> [0,305,"switchToWindow",{"name":"13"}]
09:32:25 INFO - PROCESS | 1504 | 1477589545427 Marionette TRACE conn3 <- [1,305,null,{}]
09:32:25 INFO - PROCESS | 1504 | 1477589545430 Marionette TRACE conn3 -> [0,306,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-send-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-send-open.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:25 INFO - PROCESS | 1504 | ++DOCSHELL 19D37800 == 49 [pid = 1504] [id = 70]
09:32:25 INFO - PROCESS | 1504 | ++DOMWINDOW == 114 (19D38000) [pid = 1504] [serial = 207] [outer = 00000000]
09:32:25 INFO - PROCESS | 1504 | ++DOMWINDOW == 115 (1A62BC00) [pid = 1504] [serial = 208] [outer = 19D38000]
09:32:25 INFO - PROCESS | 1504 | 1477589545495 Marionette DEBUG loaded listener.js
09:32:25 INFO - PROCESS | 1504 | ++DOMWINDOW == 116 (1A582C00) [pid = 1504] [serial = 209] [outer = 19D38000]
09:32:25 INFO - PROCESS | 1504 | 1477589545887 Marionette TRACE conn3 <- [1,306,null,{"value":["/XMLHttpRequest/open-send-open.htm",0,null,null,[["XMLHttpRequest: open() - send() - open()",0,null,null]]]}]
09:32:25 INFO - .
09:32:25 INFO - TEST-OK | /XMLHttpRequest/open-send-open.htm | took 731ms
09:32:25 INFO - PROCESS | 1504 | 1477589545906 Marionette TRACE conn3 -> [0,307,"getWindowHandle",null]
09:32:25 INFO - PROCESS | 1504 | 1477589545909 Marionette TRACE conn3 <- [1,307,null,{"value":"13"}]
09:32:25 INFO - TEST-START | /XMLHttpRequest/open-sync-open-send.htm
09:32:25 INFO - PROCESS | 1504 | 1477589545913 Marionette TRACE conn3 -> [0,308,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:26 INFO - PROCESS | 1504 | 1477589546026 Marionette TRACE conn3 <- [1,308,null,{"value":null}]
09:32:26 INFO - PROCESS | 1504 | 1477589546105 Marionette TRACE conn3 -> [0,309,"getWindowHandles",null]
09:32:26 INFO - PROCESS | 1504 | 1477589546108 Marionette TRACE conn3 <- [1,309,null,["13"]]
09:32:26 INFO - PROCESS | 1504 | 1477589546155 Marionette TRACE conn3 -> [0,310,"switchToWindow",{"name":"13"}]
09:32:26 INFO - PROCESS | 1504 | 1477589546159 Marionette TRACE conn3 <- [1,310,null,{}]
09:32:26 INFO - PROCESS | 1504 | 1477589546163 Marionette TRACE conn3 -> [0,311,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-sync-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-sync-open-send.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:26 INFO - PROCESS | 1504 | ++DOCSHELL 1ADAF800 == 50 [pid = 1504] [id = 71]
09:32:26 INFO - PROCESS | 1504 | ++DOMWINDOW == 117 (1AFDD800) [pid = 1504] [serial = 210] [outer = 00000000]
09:32:26 INFO - PROCESS | 1504 | ++DOMWINDOW == 118 (1BE62800) [pid = 1504] [serial = 211] [outer = 1AFDD800]
09:32:26 INFO - PROCESS | 1504 | 1477589546227 Marionette DEBUG loaded listener.js
09:32:26 INFO - PROCESS | 1504 | ++DOMWINDOW == 119 (1BE5FC00) [pid = 1504] [serial = 212] [outer = 1AFDD800]
09:32:26 INFO - PROCESS | 1504 | 1477589546602 Marionette TRACE conn3 <- [1,311,null,{"value":["/XMLHttpRequest/open-sync-open-send.htm",0,null,null,[["XMLHttpRequest: open() (sync) - send() - open()",0,null,null]]]}]
09:32:26 INFO - .
09:32:26 INFO - TEST-OK | /XMLHttpRequest/open-sync-open-send.htm | took 731ms
09:32:26 INFO - PROCESS | 1504 | 1477589546635 Marionette TRACE conn3 -> [0,312,"getWindowHandle",null]
09:32:26 INFO - PROCESS | 1504 | 1477589546638 Marionette TRACE conn3 <- [1,312,null,{"value":"13"}]
09:32:26 INFO - TEST-START | /XMLHttpRequest/open-url-about-blank-window.htm
09:32:26 INFO - PROCESS | 1504 | 1477589546643 Marionette TRACE conn3 -> [0,313,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:26 INFO - PROCESS | 1504 | 1477589546789 Marionette TRACE conn3 <- [1,313,null,{"value":null}]
09:32:26 INFO - PROCESS | 1504 | 1477589546914 Marionette TRACE conn3 -> [0,314,"getWindowHandles",null]
09:32:26 INFO - PROCESS | 1504 | 1477589546917 Marionette TRACE conn3 <- [1,314,null,["13"]]
09:32:26 INFO - PROCESS | 1504 | 1477589546922 Marionette TRACE conn3 -> [0,315,"switchToWindow",{"name":"13"}]
09:32:26 INFO - PROCESS | 1504 | 1477589546926 Marionette TRACE conn3 <- [1,315,null,{}]
09:32:26 INFO - PROCESS | 1504 | 1477589546932 Marionette TRACE conn3 -> [0,316,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-about-blank-window.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-about-blank-window.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:26 INFO - PROCESS | 1504 | ++DOCSHELL 01FB6400 == 51 [pid = 1504] [id = 72]
09:32:26 INFO - PROCESS | 1504 | ++DOMWINDOW == 120 (01FB6800) [pid = 1504] [serial = 213] [outer = 00000000]
09:32:27 INFO - PROCESS | 1504 | ++DOMWINDOW == 121 (01FB9C00) [pid = 1504] [serial = 214] [outer = 01FB6800]
09:32:27 INFO - PROCESS | 1504 | 1477589547018 Marionette DEBUG loaded listener.js
09:32:27 INFO - PROCESS | 1504 | ++DOMWINDOW == 122 (16A75400) [pid = 1504] [serial = 215] [outer = 01FB6800]
09:32:27 INFO - PROCESS | 1504 | ++DOCSHELL 17A75400 == 52 [pid = 1504] [id = 73]
09:32:27 INFO - PROCESS | 1504 | ++DOMWINDOW == 123 (18EE8800) [pid = 1504] [serial = 216] [outer = 00000000]
09:32:27 INFO - PROCESS | 1504 | ++DOMWINDOW == 124 (16D3B000) [pid = 1504] [serial = 217] [outer = 18EE8800]
09:32:27 INFO - PROCESS | 1504 | 1477589547651 Marionette TRACE conn3 <- [1,316,null,{"value":["/XMLHttpRequest/open-url-about-blank-window.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs (about:blank iframe)",0,null,null]]]}]
09:32:27 INFO - .
09:32:27 INFO - TEST-OK | /XMLHttpRequest/open-url-about-blank-window.htm | took 1042ms
09:32:27 INFO - PROCESS | 1504 | 1477589547683 Marionette TRACE conn3 -> [0,317,"getWindowHandle",null]
09:32:27 INFO - PROCESS | 1504 | 1477589547689 Marionette TRACE conn3 <- [1,317,null,{"value":"13"}]
09:32:27 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted-after-open.htm
09:32:27 INFO - PROCESS | 1504 | 1477589547696 Marionette TRACE conn3 -> [0,318,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:27 INFO - PROCESS | 1504 | 1477589547832 Marionette TRACE conn3 <- [1,318,null,{"value":null}]
09:32:27 INFO - PROCESS | 1504 | 1477589547927 Marionette TRACE conn3 -> [0,319,"getWindowHandles",null]
09:32:27 INFO - PROCESS | 1504 | 1477589547930 Marionette TRACE conn3 <- [1,319,null,["13"]]
09:32:27 INFO - PROCESS | 1504 | 1477589547935 Marionette TRACE conn3 -> [0,320,"switchToWindow",{"name":"13"}]
09:32:27 INFO - PROCESS | 1504 | 1477589547941 Marionette TRACE conn3 <- [1,320,null,{}]
09:32:27 INFO - PROCESS | 1504 | 1477589547945 Marionette TRACE conn3 -> [0,321,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted-after-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted-after-open.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:28 INFO - PROCESS | 1504 | ++DOCSHELL 01FAFC00 == 53 [pid = 1504] [id = 74]
09:32:28 INFO - PROCESS | 1504 | ++DOMWINDOW == 125 (0FD74400) [pid = 1504] [serial = 218] [outer = 00000000]
09:32:28 INFO - PROCESS | 1504 | ++DOMWINDOW == 126 (13B2E400) [pid = 1504] [serial = 219] [outer = 0FD74400]
09:32:28 INFO - PROCESS | 1504 | 1477589548054 Marionette DEBUG loaded listener.js
09:32:28 INFO - PROCESS | 1504 | ++DOMWINDOW == 127 (13B32C00) [pid = 1504] [serial = 220] [outer = 0FD74400]
09:32:28 INFO - PROCESS | 1504 | 1477589548490 Marionette TRACE conn3 <- [1,321,null,{"value":["/XMLHttpRequest/open-url-base-inserted-after-open.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert after open()",0,null,null]]]}]
09:32:28 INFO - .
09:32:28 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted-after-open.htm | took 825ms
09:32:28 INFO - PROCESS | 1504 | 1477589548535 Marionette TRACE conn3 -> [0,322,"getWindowHandle",null]
09:32:28 INFO - PROCESS | 1504 | 1477589548539 Marionette TRACE conn3 <- [1,322,null,{"value":"13"}]
09:32:28 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted.htm
09:32:28 INFO - PROCESS | 1504 | 1477589548544 Marionette TRACE conn3 -> [0,323,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:28 INFO - PROCESS | 1504 | 1477589548655 Marionette TRACE conn3 <- [1,323,null,{"value":null}]
09:32:28 INFO - PROCESS | 1504 | 1477589548762 Marionette TRACE conn3 -> [0,324,"getWindowHandles",null]
09:32:28 INFO - PROCESS | 1504 | 1477589548765 Marionette TRACE conn3 <- [1,324,null,["13"]]
09:32:28 INFO - PROCESS | 1504 | 1477589548773 Marionette TRACE conn3 -> [0,325,"switchToWindow",{"name":"13"}]
09:32:28 INFO - PROCESS | 1504 | 1477589548777 Marionette TRACE conn3 <- [1,325,null,{}]
09:32:28 INFO - PROCESS | 1504 | 1477589548781 Marionette TRACE conn3 -> [0,326,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:28 INFO - PROCESS | 1504 | ++DOCSHELL 0FD79C00 == 54 [pid = 1504] [id = 75]
09:32:28 INFO - PROCESS | 1504 | ++DOMWINDOW == 128 (0FF05400) [pid = 1504] [serial = 221] [outer = 00000000]
09:32:28 INFO - PROCESS | 1504 | ++DOMWINDOW == 129 (1449F800) [pid = 1504] [serial = 222] [outer = 0FF05400]
09:32:28 INFO - PROCESS | 1504 | 1477589548839 Marionette DEBUG loaded listener.js
09:32:28 INFO - PROCESS | 1504 | ++DOMWINDOW == 130 (157EEC00) [pid = 1504] [serial = 223] [outer = 0FF05400]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1A464000 == 53 [pid = 1504] [id = 66]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 01FA8800 == 52 [pid = 1504] [id = 64]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 0FD73C00 == 51 [pid = 1504] [id = 65]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 01FA4400 == 50 [pid = 1504] [id = 63]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1BB11800 == 49 [pid = 1504] [id = 61]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 18ABE000 == 48 [pid = 1504] [id = 62]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1A57D000 == 47 [pid = 1504] [id = 59]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1AFE4400 == 46 [pid = 1504] [id = 60]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 14438C00 == 45 [pid = 1504] [id = 58]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1285D800 == 44 [pid = 1504] [id = 57]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1433A400 == 43 [pid = 1504] [id = 37]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 157F8C00 == 42 [pid = 1504] [id = 38]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1A57F400 == 41 [pid = 1504] [id = 35]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1A577800 == 40 [pid = 1504] [id = 34]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 19185800 == 39 [pid = 1504] [id = 33]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 0FD7F800 == 38 [pid = 1504] [id = 53]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1677AC00 == 37 [pid = 1504] [id = 54]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1856E400 == 36 [pid = 1504] [id = 55]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 14595400 == 35 [pid = 1504] [id = 56]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 1ADAF800 == 34 [pid = 1504] [id = 71]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 01FB6400 == 33 [pid = 1504] [id = 72]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 17A75400 == 32 [pid = 1504] [id = 73]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 01FAFC00 == 31 [pid = 1504] [id = 74]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 123BFC00 == 30 [pid = 1504] [id = 67]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 151AC800 == 29 [pid = 1504] [id = 68]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 18AC5400 == 28 [pid = 1504] [id = 69]
09:32:29 INFO - PROCESS | 1504 | --DOCSHELL 19D37800 == 27 [pid = 1504] [id = 70]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 129 (1949DC00) [pid = 1504] [serial = 133] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 128 (1BD40C00) [pid = 1504] [serial = 154] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 127 (1A722000) [pid = 1504] [serial = 139] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 126 (1A578C00) [pid = 1504] [serial = 137] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 125 (19950800) [pid = 1504] [serial = 134] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 124 (16A0FC00) [pid = 1504] [serial = 115] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 123 (1BB1A000) [pid = 1504] [serial = 151] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 122 (1B182800) [pid = 1504] [serial = 149] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 121 (1B6B6400) [pid = 1504] [serial = 148] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 120 (1A579400) [pid = 1504] [serial = 136] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 119 (1BB1C000) [pid = 1504] [serial = 152] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 118 (1ADB4800) [pid = 1504] [serial = 142] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 117 (16A77400) [pid = 1504] [serial = 131] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 116 (1A724000) [pid = 1504] [serial = 140] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 115 (1ADB5C00) [pid = 1504] [serial = 143] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 114 (16B6BC00) [pid = 1504] [serial = 124] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 113 (1B180400) [pid = 1504] [serial = 145] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 112 (17A34C00) [pid = 1504] [serial = 118] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 111 (14314400) [pid = 1504] [serial = 127] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 110 (141C5000) [pid = 1504] [serial = 128] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 109 (16A0F400) [pid = 1504] [serial = 130] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 108 (1B182000) [pid = 1504] [serial = 146] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | --DOMWINDOW == 107 (18EEB800) [pid = 1504] [serial = 121] [outer = 00000000] [url = about:blank]
09:32:29 INFO - PROCESS | 1504 | 1477589549900 Marionette TRACE conn3 <- [1,326,null,{"value":["/XMLHttpRequest/open-url-base-inserted.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert ",0,null,null]]]}]
09:32:29 INFO - .
09:32:29 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted.htm | took 1384ms
09:32:29 INFO - PROCESS | 1504 | 1477589549943 Marionette TRACE conn3 -> [0,327,"getWindowHandle",null]
09:32:29 INFO - PROCESS | 1504 | 1477589549948 Marionette TRACE conn3 <- [1,327,null,{"value":"13"}]
09:32:29 INFO - TEST-START | /XMLHttpRequest/open-url-base.htm
09:32:29 INFO - PROCESS | 1504 | 1477589549955 Marionette TRACE conn3 -> [0,328,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:30 INFO - PROCESS | 1504 | 1477589550054 Marionette TRACE conn3 <- [1,328,null,{"value":null}]
09:32:30 INFO - PROCESS | 1504 | 1477589550061 Marionette TRACE conn3 -> [0,329,"getWindowHandles",null]
09:32:30 INFO - PROCESS | 1504 | 1477589550064 Marionette TRACE conn3 <- [1,329,null,["13"]]
09:32:30 INFO - PROCESS | 1504 | 1477589550069 Marionette TRACE conn3 -> [0,330,"switchToWindow",{"name":"13"}]
09:32:30 INFO - PROCESS | 1504 | 1477589550075 Marionette TRACE conn3 <- [1,330,null,{}]
09:32:30 INFO - PROCESS | 1504 | 1477589550080 Marionette TRACE conn3 -> [0,331,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:30 INFO - PROCESS | 1504 | ++DOCSHELL 0E644400 == 28 [pid = 1504] [id = 76]
09:32:30 INFO - PROCESS | 1504 | ++DOMWINDOW == 108 (0E6C3C00) [pid = 1504] [serial = 224] [outer = 00000000]
09:32:30 INFO - PROCESS | 1504 | ++DOMWINDOW == 109 (0FD7FC00) [pid = 1504] [serial = 225] [outer = 0E6C3C00]
09:32:30 INFO - PROCESS | 1504 | 1477589550143 Marionette DEBUG loaded listener.js
09:32:30 INFO - PROCESS | 1504 | ++DOMWINDOW == 110 (0FF07000) [pid = 1504] [serial = 226] [outer = 0E6C3C00]
09:32:30 INFO - PROCESS | 1504 | 1477589550546 Marionette TRACE conn3 <- [1,331,null,{"value":["/XMLHttpRequest/open-url-base.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - ",0,null,null]]]}]
09:32:30 INFO - .
09:32:30 INFO - TEST-OK | /XMLHttpRequest/open-url-base.htm | took 638ms
09:32:30 INFO - PROCESS | 1504 | 1477589550574 Marionette TRACE conn3 -> [0,332,"getWindowHandle",null]
09:32:30 INFO - PROCESS | 1504 | 1477589550577 Marionette TRACE conn3 <- [1,332,null,{"value":"13"}]
09:32:30 INFO - TEST-START | /XMLHttpRequest/open-url-bogus.htm
09:32:30 INFO - PROCESS | 1504 | 1477589550582 Marionette TRACE conn3 -> [0,333,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:30 INFO - PROCESS | 1504 | 1477589550685 Marionette TRACE conn3 <- [1,333,null,{"value":null}]
09:32:30 INFO - PROCESS | 1504 | 1477589550692 Marionette TRACE conn3 -> [0,334,"getWindowHandles",null]
09:32:30 INFO - PROCESS | 1504 | 1477589550694 Marionette TRACE conn3 <- [1,334,null,["13"]]
09:32:30 INFO - PROCESS | 1504 | 1477589550698 Marionette TRACE conn3 -> [0,335,"switchToWindow",{"name":"13"}]
09:32:30 INFO - PROCESS | 1504 | 1477589550702 Marionette TRACE conn3 <- [1,335,null,{}]
09:32:30 INFO - PROCESS | 1504 | 1477589550705 Marionette TRACE conn3 -> [0,336,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:30 INFO - PROCESS | 1504 | ++DOCSHELL 12603800 == 29 [pid = 1504] [id = 77]
09:32:30 INFO - PROCESS | 1504 | ++DOMWINDOW == 111 (1285D800) [pid = 1504] [serial = 227] [outer = 00000000]
09:32:30 INFO - PROCESS | 1504 | ++DOMWINDOW == 112 (13FEB800) [pid = 1504] [serial = 228] [outer = 1285D800]
09:32:30 INFO - PROCESS | 1504 | 1477589550763 Marionette DEBUG loaded listener.js
09:32:30 INFO - PROCESS | 1504 | ++DOMWINDOW == 113 (14339800) [pid = 1504] [serial = 229] [outer = 1285D800]
09:32:31 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/netwerk/base/nsIOService.cpp, line 778
09:32:31 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:\builds\moz2_slave\fx-team-w32-d-0000000000000000\build\src\netwerk\base\nsNetUtilInlines.h, line 180
09:32:31 INFO - PROCESS | 1504 | [1504] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/fx-team-w32-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 2495
09:32:31 INFO - PROCESS | 1504 | 1477589551168 Marionette TRACE conn3 <- [1,336,null,{"value":["/XMLHttpRequest/open-url-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus URLs (//[)",0,null,null],["XMLHttpRequest: open() - bogus URLs (ftp:)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:19:7\n"],["XMLHttpRequest: open() - bogus URLs (http://a a/)",0,null,null],["XMLHttpRequest: open() - bogus URLs (http:////////////)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:21:7\n"],["XMLHttpRequest: open() - bogus URLs (http://u:p@/)",0,null,null]]]}]
09:32:31 INFO - .....
09:32:31 INFO - TEST-OK | /XMLHttpRequest/open-url-bogus.htm | took 637ms
09:32:31 INFO - PROCESS | 1504 | 1477589551224 Marionette TRACE conn3 -> [0,337,"getWindowHandle",null]
09:32:31 INFO - PROCESS | 1504 | 1477589551229 Marionette TRACE conn3 <- [1,337,null,{"value":"13"}]
09:32:31 INFO - TEST-START | /XMLHttpRequest/open-url-encoding.htm
09:32:31 INFO - PROCESS | 1504 | 1477589551234 Marionette TRACE conn3 -> [0,338,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:31 INFO - PROCESS | 1504 | 1477589551338 Marionette TRACE conn3 <- [1,338,null,{"value":null}]
09:32:31 INFO - PROCESS | 1504 | 1477589551345 Marionette TRACE conn3 -> [0,339,"getWindowHandles",null]
09:32:31 INFO - PROCESS | 1504 | 1477589551348 Marionette TRACE conn3 <- [1,339,null,["13"]]
09:32:31 INFO - PROCESS | 1504 | 1477589551352 Marionette TRACE conn3 -> [0,340,"switchToWindow",{"name":"13"}]
09:32:31 INFO - PROCESS | 1504 | 1477589551356 Marionette TRACE conn3 <- [1,340,null,{}]
09:32:31 INFO - PROCESS | 1504 | 1477589551361 Marionette TRACE conn3 -> [0,341,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-encoding.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-encoding.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:31 INFO - PROCESS | 1504 | ++DOCSHELL 16773800 == 30 [pid = 1504] [id = 78]
09:32:31 INFO - PROCESS | 1504 | ++DOMWINDOW == 114 (16775400) [pid = 1504] [serial = 230] [outer = 00000000]
09:32:31 INFO - PROCESS | 1504 | ++DOMWINDOW == 115 (16A0FC00) [pid = 1504] [serial = 231] [outer = 16775400]
09:32:31 INFO - PROCESS | 1504 | 1477589551420 Marionette DEBUG loaded listener.js
09:32:31 INFO - PROCESS | 1504 | ++DOMWINDOW == 116 (16A75800) [pid = 1504] [serial = 232] [outer = 16775400]
09:32:31 INFO - PROCESS | 1504 | [1504] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\fx-team-w32-d-0000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 594
09:32:31 INFO - PROCESS | 1504 | [1504] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\fx-team-w32-d-0000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 495
09:32:31 INFO - PROCESS | 1504 | 1477589551803 Marionette TRACE conn3 <- [1,341,null,{"value":["/XMLHttpRequest/open-url-encoding.htm",0,null,null,[["percent encode characters",0,null,null],["lone surrogate should return U+FFFD",0,null,null]]]}]
09:32:31 INFO - ..
09:32:31 INFO - TEST-OK | /XMLHttpRequest/open-url-encoding.htm | took 575ms
09:32:31 INFO - PROCESS | 1504 | 1477589551809 Marionette TRACE conn3 -> [0,342,"getWindowHandle",null]
09:32:31 INFO - PROCESS | 1504 | 1477589551812 Marionette TRACE conn3 <- [1,342,null,{"value":"13"}]
09:32:31 INFO - TEST-START | /XMLHttpRequest/open-url-fragment.htm
09:32:31 INFO - PROCESS | 1504 | 1477589551818 Marionette TRACE conn3 -> [0,343,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:31 INFO - PROCESS | 1504 | 1477589551961 Marionette TRACE conn3 <- [1,343,null,{"value":null}]
09:32:32 INFO - PROCESS | 1504 | 1477589552013 Marionette TRACE conn3 -> [0,344,"getWindowHandles",null]
09:32:32 INFO - PROCESS | 1504 | 1477589552016 Marionette TRACE conn3 <- [1,344,null,["13"]]
09:32:32 INFO - PROCESS | 1504 | 1477589552019 Marionette TRACE conn3 -> [0,345,"switchToWindow",{"name":"13"}]
09:32:32 INFO - PROCESS | 1504 | 1477589552023 Marionette TRACE conn3 <- [1,345,null,{}]
09:32:32 INFO - PROCESS | 1504 | 1477589552026 Marionette TRACE conn3 -> [0,346,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-fragment.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-fragment.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:32 INFO - PROCESS | 1504 | ++DOCSHELL 16A0B800 == 31 [pid = 1504] [id = 79]
09:32:32 INFO - PROCESS | 1504 | ++DOMWINDOW == 117 (17508C00) [pid = 1504] [serial = 233] [outer = 00000000]
09:32:32 INFO - PROCESS | 1504 | ++DOMWINDOW == 118 (17A2DC00) [pid = 1504] [serial = 234] [outer = 17508C00]
09:32:32 INFO - PROCESS | 1504 | 1477589552081 Marionette DEBUG loaded listener.js
09:32:32 INFO - PROCESS | 1504 | ++DOMWINDOW == 119 (17A75000) [pid = 1504] [serial = 235] [outer = 17508C00]
09:32:32 INFO - PROCESS | 1504 | 1477589552451 Marionette TRACE conn3 <- [1,346,null,{"value":["/XMLHttpRequest/open-url-fragment.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - fragment identifier",0,null,null],["make sure fragment is removed from URL before request",0,null,null],["make sure fragment is removed from URL before request (with query string)",0,null,null],["make sure escaped # is not removed",0,null,null]]]}]
09:32:32 INFO - ....
09:32:32 INFO - TEST-OK | /XMLHttpRequest/open-url-fragment.htm | took 684ms
09:32:32 INFO - TEST-START | /XMLHttpRequest/open-url-javascript-window-2.htm
09:32:32 INFO - PROCESS | 1504 | 1477589552515 Marionette TRACE conn3 -> [0,347,"getWindowHandle",null]
09:32:32 INFO - PROCESS | 1504 | 1477589552518 Marionette TRACE conn3 <- [1,347,null,{"value":"13"}]
09:32:32 INFO - PROCESS | 1504 | 1477589552523 Marionette TRACE conn3 -> [0,348,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:32:32 INFO - PROCESS | 1504 | 1477589552648 Marionette TRACE conn3 <- [1,348,null,{"value":null}]
09:32:32 INFO - PROCESS | 1504 | 1477589552654 Marionette TRACE conn3 -> [0,349,"getWindowHandles",null]
09:32:32 INFO - PROCESS | 1504 | 1477589552657 Marionette TRACE conn3 <- [1,349,null,["13"]]
09:32:32 INFO - PROCESS | 1504 | 1477589552661 Marionette TRACE conn3 -> [0,350,"switchToWindow",{"name":"13"}]
09:32:32 INFO - PROCESS | 1504 | 1477589552665 Marionette TRACE conn3 <- [1,350,null,{}]
09:32:32 INFO - PROCESS | 1504 | 1477589552713 Marionette TRACE conn3 -> [0,351,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-javascript-window-2.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-javascript-window-2.htm\", \"ab9a1196-8f5e-4553-8496-807cf46f2e4b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:32:32 INFO - PROCESS | 1504 | ++DOCSHELL 18A2B400 == 32 [pid = 1504] [id = 80]
09:32:32 INFO - PROCESS | 1504 | ++DOMWINDOW == 120 (18A32C00) [pid = 1504] [serial = 236] [outer = 00000000]
09:32:32 INFO - PROCESS | 1504 | ++DOMWINDOW == 121 (18C96000) [pid = 1504] [serial = 237] [outer = 18A32C00]
09:32:32 INFO - PROCESS | 1504 | 1477589552768 Marionette DEBUG loaded listener.js
09:32:32 INFO - PROCESS | 1504 | ++DOMWINDOW == 122 (18C9FC00) [pid = 1504] [serial = 238] [outer = 18A32C00]
09:32:33 INFO - PROCESS | 1504 | ++DOCSHELL 18AC7400 == 33 [pid = 1504] [id = 81]
09:32:33 INFO - PROCESS | 1504 | ++DOMWINDOW == 123 (194DB000) [pid = 1504] [serial = 239] [outer = 00000000]
09:32:33 INFO - PROCESS | 1504 | ++DOMWINDOW == 124 (194DB400) [pid = 1504] [serial = 240] [outer = 194DB000]
09:32:33 INFO - PROCESS | 1504 | 1477589553213 Marionette TRACE conn3 <- [1,351,null,{"value":["/XMLHttpRequest/open-url-javascript-window-2.htm",0,null,null,[["XMLHttpRequest: open() - resolving URLs (javascript: